Skip to Content.
Sympa Menu

netsec-sig - Re: [Security-WG] Re: [NTAC] DNS Serving Stale to the rescue?

Subject: Internet2 Network Security SIG

List archive

Re: [Security-WG] Re: [NTAC] DNS Serving Stale to the rescue?


Chronological Thread 
  • From: Paul Howell <>
  • To: "" <>, Akbar Kara <>
  • Cc: Bill Owens <>, NTAC <>, Kim Milford <>, "" <>
  • Subject: Re: [Security-WG] Re: [NTAC] DNS Serving Stale to the rescue?
  • Date: Fri, 3 Nov 2017 15:32:58 +0000
  • Accept-language: en-US
  • Authentication-results: internet2.edu; dkim=none (message not signed) header.d=none;internet2.edu; dmarc=none action=none header.from=internet2.edu;
  • Ironport-phdr: 9a23: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
  • Spamdiagnosticoutput: 1:0

I think this is a timely topic.  Resiliency in the  face of sever disruptions that essentially segment major networks is something we've been discussing inside of Internet2 and began promoting externally as well, doing a presentation at the DHS cyber security table recently on this topic.  As a follow up to the presentation, I'm writing an article for our newsletter that will come out later this month.  I am always interested in working together on this topic, perhaps we could have a security-wg call to discuss further.  Thoughts on that?

 

Regards,

Paul

 

 

From: <> on behalf of Steven Wallace <>
Reply-To: <>
Date: Friday, November 3, 2017 at 10:54 AM
To: Akbar Kara <>
Cc: Bill Owens <>, "" <>, NTAC <>, Kim Milford <>, "" <>
Subject: [Security-WG] Re: [NTAC] DNS Serving Stale to the rescue?

 

My scenario is loss of Internet connectivity. That would include loss of TR-CPS.

 

I think we need to be careful WRT to routes to roots. Roots are anycast, and since most of us local-pref TR-CPS/I2, this could lead to suboptimal DNS requests, both in terms of path used, and concentrating queries to fewer serves. This may already be happening. It would be good for someone to check the I2/CPS routing tables for the root anycast prefixes.

 

steve



On Nov 3, 2017, at 10:48 AM, Akbar Kara <> wrote:

 

Steve,

 

Could we not ask TRCPS to carry routes to root server infrastructure? Or is the assumption that campus has lost TRCPS too!

 

Alternatively, it would be interesting to run quagga on AWS vm (that has a path to commodity) and have quagga vm NAT packets originating from your campus DNS that are destined to external DNS.  Maybe something will break... One could do this test for the cost of a latte 😀

/ak

 

 +1 214-392-2717 | LEARN NOC: +1 866-647-8728  |  

 


On Nov 3, 2017, at 8:56 AM, Steven Wallace <> wrote:

In some of my uses cases, it ensure the resolver continues to have access to the authoritative name server.

 

For example, caching the TLD entry that points to canvas’s name server (which happens to be hosted in AWS), ensures my resolver is able to refresh its cache for canvas’s domain.

 

steve

 



On Nov 2, 2017, at 9:44 PM, Bill Owens <> wrote:

 

It sounds as though this would solve many problems in your isolated campus scenario, but I wonder about the side effects on providers who load balance by returning different DNS results. It’s not uncommon to see 60-second TTLs in records from cloud providers, sometimes even shorter. I think it is unlikely that the server behind whatever A record BIND decided to stick with would simply go away, but it is possible that server would be overwhelmed by the continuous load from your campus. It might be worth a discussion with your critical cloud providers, if they’re willing to discuss that ‘secret sauce’.

 

Bill.


On Nov 2, 2017, at 11:00 AM, Steven Wallace <> wrote:

It’s going to get better. BIND 9.12 (currently in beta, GA due out end of year?) supports “serve stale” (see: https://tools.ietf.org/html/draft-tale-dnsop-serve-stale-02). Serving Stale Data to Improve DNS Resiliency - does what you’d expect. If the resolver can’t update a cached entry, it responsed with the its current cached entry. BTW, this would have mitigated the October Dyn outage, which left many in the community without access to Box, PayPal, etc., despite the fact that we had working network paths to these service providers.

 

 




Archive powered by MHonArc 2.6.19.

Top of Page