[185801] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNSSEC and ISPs faking DNS responses

daemon@ATHENA.MIT.EDU (John R. Levine)
Fri Nov 13 12:46:34 2015

X-Original-To: nanog@nanog.org
Date: 13 Nov 2015 12:33:12 -0500
From: "John R. Levine" <johnl@iecc.com>
To: "Owen DeLong" <owen@delong.com>
In-Reply-To: <9A14E989-8633-4937-BE46-7D27F5747235@delong.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

>> At this point very few client resolvers check DNSSEC, so something
>> that stripped off all the DNSSEC stuff and inserted lies where
>> required would "work" for most clients.  At least until they realized
>> they couldn't get to PokerStars and switched their DNS to 8.8.8.8.
>
> If the ISPs don’t start blocking well known public resolvers or even just
> blocking port 53 in general (which has been known to happen).

I doubt the ISPs in Québec would have much sympathy for this proposed law. 
It makes their life harder and provides them no benefit.  Should it pass 
(remember, it's just proposed), I expect they'd just adjust their DNS 
caches to block responses for the list of domains that the government 
mails them and claim they're in full compliance.

R's,
John

home help back first fref pref prev next nref lref last post