Re: [DNSOP] Cache poisoning on DNSSEC

Mark Andrews <Mark_Andrews@isc.org> Wed, 27 August 2008 00:48 UTC

Return-Path: <dnsop-bounces@ietf.org>
X-Original-To: dnsop-archive@optimus.ietf.org
Delivered-To: ietfarch-dnsop-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9FDD53A6C38; Tue, 26 Aug 2008 17:48:32 -0700 (PDT)
X-Original-To: dnsop@core3.amsl.com
Delivered-To: dnsop@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6D81D3A6C0A for <dnsop@core3.amsl.com>; Tue, 26 Aug 2008 17:48:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.024
X-Spam-Level:
X-Spam-Status: No, score=-0.024 tagged_above=-999 required=5 tests=[AWL=2.575, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AeCOS7ugYsUC for <dnsop@core3.amsl.com>; Tue, 26 Aug 2008 17:48:30 -0700 (PDT)
Received: from drugs.dv.isc.org (drugs.dv.isc.org [IPv6:2001:470:1f00:820:214:22ff:fed9:fbdc]) by core3.amsl.com (Postfix) with ESMTP id D1E0E3A6A19 for <dnsop@ietf.org>; Tue, 26 Aug 2008 17:48:25 -0700 (PDT)
Received: from drugs.dv.isc.org (localhost [127.0.0.1]) by drugs.dv.isc.org (8.14.2/8.14.2) with ESMTP id m7R0mFQ0051227; Wed, 27 Aug 2008 10:48:16 +1000 (EST) (envelope-from marka@drugs.dv.isc.org)
Message-Id: <200808270048.m7R0mFQ0051227@drugs.dv.isc.org>
To: Dean Anderson <dean@av8.com>
From: Mark Andrews <Mark_Andrews@isc.org>
In-reply-to: Your message of "Tue, 26 Aug 2008 15:02:07 -0400." <Pine.LNX.4.44.0808261445330.13198-100000@citation2.av8.net>
Date: Wed, 27 Aug 2008 10:48:15 +1000
Cc: "Blacka, David" <davidb@verisign.com>, Ralf Weber <denic@eng.colt.net>, "dnsop@ietf.org WG" <dnsop@ietf.org>
Subject: Re: [DNSOP] Cache poisoning on DNSSEC
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/dnsop>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: dnsop-bounces@ietf.org
Errors-To: dnsop-bounces@ietf.org

> Large UDP packets (think EDNSO DNSSEC as a good example of large UDP
> packets almost certain to be fragmented) suffer the same problem, as
> they can be fragmented by PMTU discovery. The server (operating system)
> has to maintain UDP state for PMTUD to work.  If the ICMP fragmentation
> needed is lost due to Anycast, PMTUD will fail. Lost UDP fragments are
> fatal to the UDP transaction.

	Actually you just turn off PMTUD on replies.  This is
	recommended for *all* nameservers.  It's pointless for
	authoritative nameservers to maintain PMTU state and may
	infact be a DoS vector if they do.

	IPv4 - Don't set FD.
	IPv6 - Fragment at the server at network MTU.

	The socket option IPV6_USE_MIN_MTU was a direct consequence
	of DNS operators looking at this issue over 10 years ago.

	http://www3.tools.ietf.org/html/draft-ietf-ipngwg-bsd-frag-01

	Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews@isc.org
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop