Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month at the Massachusetts Institute of Technology, in Building E51.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] free SSL certs from the EFF



> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
> bounces+blu=nedharvey.com at blu.org] On Behalf Of Derek Atkins
> 
> Richard Pieri <richard.pieri at gmail.com> writes:
> 
> > Which results in a denial of service for clients if DNSSEC is
> > enforced. That's not protecting users; that's dumping them into black
> > holes.
> 
> Some say DoS, some say protected.  If someone is trying to poison my DNS
> Cache I'd rather ignore them and blackhole than accept their attack and
> go to the wrong place.  Besides, DNS allows me to go ask multiple
> sources for information.

+1

The correct behavior is to refuse to use corrupted data, and probably retry the query to get good data.  If an intermediary router wants to cause a DoS, then stripping security would be the stupidest way possible to execute such an attack - rather than just dropping the packet.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org