Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Performance vulnerability in dname compression #173

Open
vzuevsky opened this issue Apr 18, 2022 · 0 comments · May be fixed by #174
Open

Performance vulnerability in dname compression #173

vzuevsky opened this issue Apr 18, 2022 · 0 comments · May be fixed by #174

Comments

@vzuevsky
Copy link

We saw some automated NSEC walks were degrading performance of our HW fleet. Based on that, I had designed an exploit that exacerbated the impact. Both scenaria employ query packets with the maximal number of labels:

Screenshot 2022-04-18 at 17 59 34

I profiled software performance under degradation and observed the culprit, that happens be LDNS wire compression algorithm as per this flame chart:

flame

I have now redesigned that algorithm and would like to contribute with a patch. I have also added a doc file explaining the proposed fix.

@vzuevsky vzuevsky linked a pull request Apr 18, 2022 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant