[98508] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: large organization nameservers sending icmp packets to dns servers.

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Fri Aug 10 11:21:15 2007

To: Paul Vixie <vixie@vix.com>
Cc: nanog@merit.edu
In-Reply-To: Your message of "Thu, 09 Aug 2007 22:58:40 -0000."
             <g3bqdgfh7j.fsf@sa.vix.com>
From: Valdis.Kletnieks@vt.edu
Date: Fri, 10 Aug 2007 11:14:55 -0400
Errors-To: owner-nanog@merit.edu


--==_Exmh_1186758895_6376P
Content-Type: text/plain; charset=us-ascii

On Thu, 09 Aug 2007 22:58:40 -0000, Paul Vixie said:

> > How does the (eventual) deployment of DNSSEC change these numbers?
> 
> DNSSEC cannot be signalled except in EDNS.

Right. Elsewhere in this thread, somebody discussed ugly patches to keep
the packet size under 512.  I dread to think how many different ways of
"protecting" DNS are deployed that will break EDNS, and just haven't been
noticed because there's little enough *actual* EDNS breakage that it's down
in the noise of *other* "random voodoo" breakage at those sites.

> > And who's likely to feel *that* pain first?
> 
> the DNSSEC design seems to distribute pain very fairly.

I actually meant "which 800 pound gorilla is going to try this first and
find all the bustifications", but your answer is good too.. :)


--==_Exmh_1186758895_6376P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQFGvIDvcC3lWbTT17ARAgXAAKDl7+v11YBWMgdQSgzsMeTrD7XxrwCgoMD3
qWuZ5FBnNSvRFwWKaXYyVS8=
=P2F6
-----END PGP SIGNATURE-----

--==_Exmh_1186758895_6376P--


home help back first fref pref prev next nref lref last post