Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Value proposition conflict #21

Open
ekr opened this issue Sep 9, 2020 · 0 comments
Open

Value proposition conflict #21

ekr opened this issue Sep 9, 2020 · 0 comments
Labels

Comments

@ekr
Copy link

@ekr ekr commented Sep 9, 2020

The document talks about data origin authentication:

Verify that answers come from the selected DNS resolver

But then in S 5 concedes that maybe we have to consider only passive attackers:

When discovering DNS resolvers on a local network, clients have no
mechanism to distinguish between cases where an active attacker with
the above capabilities is interfering with discovery, and situations
wherein the network has no encrypted resolver. Absent such a
mechanism, an attacker can always succeed in these goals. Therefore,
in such circumstances, viable solutions for local DNS resolver
discovery should consider weaker attackers, such as those with only
passive eavesdropping capabilities. It is unknown whether such
relaxations represent a realistic attacker in practice. Thus, local
discovery solutions designed around this threat model may have
limited value.

But if you have a passive-only attacker, then data origin authentication is irrelevant. Which is it?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants