[dns-operations] How many kinds of DNS DoS attacks are we	trying to stop ?
    Vernon Schryver 
    vjs at rhyolite.com
       
    Thu Sep 27 18:22:16 UTC 2012
    
    
  
>   DNS DDoS amplifier resistance: as a thought, would it be a reasonable
>   step, not hurting interop, to have an authoritative DNS server process
>   a UDP-based ANY query by including, at most, an MX and any A responses
>   in the ANSWER section and setting the TrunCated bit of the response if
>   there were any other records skipped?
Try some experiments to see if what kind of amplification you can get
without ANY.  I see about 20X from `dig +dnssec asadfasdf.com`
If your defenses handle non-ANY attacks, then what do you gain from
doing anything about in particular about ANY except more code, more
bugs, more CPU cycles, and fewer queries/second?
Doing any special for ANY queries makes as little sense as filtering
all ICMP packets.
Why is it that so much of computer security is based on the insane
assumption that everyone else and especially adveraries are stupid?
"There is always an easy solution to every human problem--neat,
plausible, and wrong."  --H. L. Mencken"
Vernon Schryver    vjs at rhyolite.com
    
    
More information about the dns-operations
mailing list