large organization nameservers sending icmp packets to dns servers.

Patrick W. Gilmore patrick at ianai.net
Tue Aug 7 18:38:06 UTC 2007


On Aug 7, 2007, at 2:14 PM, Donald Stahl wrote:

>> All things being equal (which they're usually not) you could use  
>> the ACK
>> response time of the TCP handshake if they've got TCP DNS resolution
>> available. Though again most don't for security reasons...
>
> Then most are incredibly stupid.

Those are impressively harsh words.

Mind if I ask what operational experience you have with name servers  
behind firewalls filtering TCP53?  I have none, so perhaps you could  
enlighten us with your vast experience?


> Several anti DoS utilities force unknown hosts to initiate a query  
> via TCP in order to be whitelisted. If the host can't perform a TCP  
> query then they get blacklisted.

That trick is so well known, most people turn it off since there has  
been more than one instance of large, well known organizations  
suffering spectacular failures by using it.  The phrase "worse than  
the disease" comes to mind.


> In addition, any UDP truncated response needs to be retried via  
> TCP- blocking it would cause a variety of problems.

Since we are talking about authorities here, one can control the size  
of ones responses.

Unless, of course, you are so incredibly stupid you can't figure out  
the difference between an authority and a caching server.

-- 
TTFN,
patrick




More information about the NANOG mailing list