Re: NGtrans - DNSext joint meeting, call for participation
gson@nominum.com (Andreas Gustafsson) Wed, 25 July 2001 14:08 UTC
Received: from psg.com (exim@psg.com [147.28.0.62]) by ietf.org (8.9.1a/8.9.1a) with SMTP id KAA23447 for <dnsext-archive@lists.ietf.org>; Wed, 25 Jul 2001 10:08:17 -0400 (EDT)
Received: from lserv by psg.com with local (Exim 3.31 #1) id 15POE7-000IdS-00 for namedroppers-data@psg.com; Wed, 25 Jul 2001 05:57:23 -0700
Received: from h-135-207-10-122.research.att.com ([135.207.10.122] helo=roam.psg.com) by psg.com with esmtp (Exim 3.31 #1) id 15POE6-000IdD-00 for namedroppers@ops.ietf.org; Wed, 25 Jul 2001 05:57:22 -0700
Received: from randy by roam.psg.com with local (Exim 3.30 #1) id 15POE6-0002ZZ-00 for namedroppers@ops.ietf.org; Wed, 25 Jul 2001 05:57:22 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
From: gson@nominum.com
To: Matt Crawford <crawdad@fnal.gov>
Cc: Alain Durand <Alain.Durand@sun.com>, Olafur Gudmundsson <ogud@ogud.com>, ngtrans@sunroof.eng.sun.com, namedroppers@ops.ietf.org, ipng@sunroof.eng.sun.com
Subject: Re: NGtrans - DNSext joint meeting, call for participation
In-Reply-To: <E15OmqF-000IyQ-00@psg.com>
References: <E15NZcZ-0006QL-00@psg.com> <E15OmqF-000IyQ-00@psg.com>
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
Message-Id: <E15POE7-000IdS-00@psg.com>
Date: Wed, 25 Jul 2001 05:57:23 -0700
Content-Transfer-Encoding: 7bit
Matt Crawford writes: > I offer > http://home.fnal.gov/~crawdad/draft-ietf-dnsext-ipv6-dns-response-00.txt I would like to comment on section 1.3: > 1.3. DNSSEC - Aggravation or Amelioration? > > An extreme case of A6 deployment (some might say a nightmare case), > in the A6 record for each portion of an address is in a zone > belonging to the party by whom that set of bits has been assigned. > This is a situation which is improved by ubiquitous use of DNSSEC > [DNSSEC] since the leaf site can cache authenticated data for its > entire prefix chain and a DNS client can confidently accept that > data without having to make extra queries. You seem to be suggesting that if or when DNSSEC is deployed, authoritative servers should start actively caching data related to the data they are authoritative for, and resolvers (aka caching servers) should start making use of response data outside the domain for which the authoritative server is being queried, rather than discarding it like current resolvers do. I disagree. Having authoritative servers send such cached data, and having resolvers accept it, is a bad idea whether or not DNSSEC is being used. If a DNSSEC aware resolver accepts data from a poisoned cache, DNSSEC will detect the poisoning, but this does not in any way guarantee that the resolution will succeed - in practice, a much more likely outcome is that a security error is returned to the client. This could be exploited for denial of service attacks. -- Andreas Gustafsson, gson@nominum.com to unsubscribe send a message to namedroppers-request@ops.ietf.org with the word 'unsubscribe' in a single line as the message text body.
- NGtrans - DNSext joint meeting, call for particip… Alain Durand
- Re: NGtrans - DNSext joint meeting, call for part… D. J. Bernstein
- Re: NGtrans - DNSext joint meeting, call for part… Andreas Gustafsson