On Fri, Jan 01, 2010 at 09:44:13PM +0000, Paul Vixie wrote:
> Jason Bertoch <ja...@i6ix.com> writes:
> 
> >> Dec 31 10:12:37 linux-1ij2 named[14306]: too many timeouts resolving
> >> 'XXX.YYY.ZZZ/A' (in 'YYY.ZZZ'?): disabling EDNS
> >
> > Do you have a firewall in front of this server that limits DNS packets to
> > 512 bytes?
> 
> statistically speaking, yes, most people have that.  which is damnfoolery,
> but well supported by the vendors, who think either that udp/53 datagrams
> larger than 512 octets are amplification attacks, or that udp packets having
> no port numbers because they are fragments lacking any udp port information,
> are evil and dangerous.  sadly, noone has yet been fired for buying devices
> that implement this kind of overspecification.  hopefully that will change
> after the DNS root zone is signed and udp/53 responses start to generally
> include DNSSEC signatures, pushing most of them way over the 512 octet limit.
> 
> it's going to be another game of chicken -- will the people who build and/or
> deploy such crapware lose their jobs, or will ICANN back down from DNSSEC?
> -- 
> Paul Vixie
> KI6YSY


        well, having been pushing vendors for a while on this, expect
        at least Checkpoint and Cisco to have corrected solutions fielded
        soon - and RedHat has fixed their DNSMASQ code since it was pointed 
        out to them that thier defaults were based on flawed assumptions.

        Not a lost cause - but the inertia of the installed base is huge and
        it will take more than the last six months of work to make a dent.
        It would help if the BIND EDNS0 negotiation would not fall back to the
        512 byte limit - perhaps you could talk with the ISC developers about 
        that.

--bill

Reply via email to