Re: Tsvart last call review of draft-ietf-doh-dns-over-https-13

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 08/11/2018 04:16 PM, John Levine wrote:
> In article <153397442482.20828.13036371457377811227@xxxxxxxxxxxxxx> you write:
>> This document is almost ready, but requires some clarifications and, more
>> importantly, an analysis of the impact of switching from a connection-less
>> protocol (UDP) to a connection-oriented protocol (HTTPS/TCP) for DNS resolution.
> 
> But DNS resolution has always worked over TCP.  See RFC 1035, section
> 4.2.2.  Tbe usual case is retry on TCP when a UDP response is
> truncated, but it's equally valid to do TCP in the first place.

I'm aware of that. But with traditional DNS, you start with UDP, and may
fall back to TCP. DoS'ing the TCP support doesn't DoS the whole system.
(If it were the case that 100% of UDP-based resolutions result in a
subsequnt TCP-based resolution (which I'm not saying is not the case..I
just don't know), then I wouldn't have this concern)



> Is there a reason that the security threats of DOH over TCP would be
> any diferent from existing DNS over TCP?

What could be different is the impact. What I'm wondering is, in a way,
to what extent it might be easier to completely DoS DNS resolution for
the DoH case. -- Defending against resource-exhaustion attacks is
certainly more complex for stateful protocols.

Thanks!

Cheers,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@xxxxxxxxxxxxxxx
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492







[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux