On Aug 7, 2007, at 2:14 PM, Donald Stahl wrote:
All things being equal (which they're usually not) you could use the ACK response time of the TCP handshake if they've got TCP DNS resolution available. Though again most don't for security reasons...
Then most are incredibly stupid.
Those are impressively harsh words. Mind if I ask what operational experience you have with name servers behind firewalls filtering TCP53? I have none, so perhaps you could enlighten us with your vast experience?
Several anti DoS utilities force unknown hosts to initiate a query via TCP in order to be whitelisted. If the host can't perform a TCP query then they get blacklisted.
That trick is so well known, most people turn it off since there has been more than one instance of large, well known organizations suffering spectacular failures by using it. The phrase "worse than the disease" comes to mind.
In addition, any UDP truncated response needs to be retried via TCP- blocking it would cause a variety of problems.
Since we are talking about authorities here, one can control the size of ones responses. Unless, of course, you are so incredibly stupid you can't figure out the difference between an authority and a caching server. -- TTFN, patrick