maybe a dumb idea on how to fix the dns problems i don't know....
Matt F
matt at credibleinstitution.org
Sat Aug 9 22:10:52 UTC 2008
Why not just require TCP for a lookup if a response with an incorrect
TXID is received? You could require TCP for just the one lookup or for
some configured interval, say 1 hour. That should slow attackers down
substantially.
Joe Abley wrote:
>
> On 9 Aug 2008, at 17:22, Church, Charles wrote:
>
>> TCP would work, but it makes it more difficult to do Anycast, which
>> works well with UDP and DNS.
>
> TCP works pretty well with anycast too, if you're careful. It's
> helpful if your transactions are short-lived.
>
> I've seen concern expressed that a server which can handle 100,000 qps
> over UDP might well fare substantially more poorly if every query
> arrives using TCP transport. The business of large-scale HTTP is a
> fairly well-understood problem, however, and has some similar
> characteristics, so perhaps this is less of a long-term problem. I
> don't know, I haven't run any experiments to figure out the practical
> impact on performance of using TCP exclusively.
>
> There is, however, the practical consideration that a generation of
> firewall "administrators" seem to believe that 53/tcp is only ever
> used for zone transfers, and can safely be closed for all other use.
>
> I suspect that a route with better practical implications will be for
> resolvers to pad queries with additional entropy as EDNS0 options, and
> to fall back to TCP if EDNS0 is unsupported. That requires some
> confidence that EDNS0 support in authority servers is widespread,
> however.
>
> draft-vixie-dnsext-dns0x20 describes a shorter-term option for
> introducing additional entropy into queries using UDP transport, with
> or without EDNS0.
>
>
> Joe
>
>
>
More information about the NANOG
mailing list