Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month, online, via Jitsi Meet.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] free SSL certs from the EFF



> From: discuss-bounces+blu=nedharvey.com at blu.org [mailto:discuss-
> bounces+blu=nedharvey.com at blu.org] On Behalf Of Derek Atkins
> 
> Richard Pieri <richard.pieri at gmail.com> writes:
> 
> > Which results in a denial of service for clients if DNSSEC is
> > enforced. That's not protecting users; that's dumping them into black
> > holes.
> 
> Some say DoS, some say protected.  If someone is trying to poison my DNS
> Cache I'd rather ignore them and blackhole than accept their attack and
> go to the wrong place.  Besides, DNS allows me to go ask multiple
> sources for information.

+1

The correct behavior is to refuse to use corrupted data, and probably retry the query to get good data.  If an intermediary router wants to cause a DoS, then stripping security would be the stupidest way possible to execute such an attack - rather than just dropping the packet.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org