Skip to main content

Improving DNS Service Availability by Using Long TTL Values
draft-pappas-dnsop-long-ttl-04

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Eric Osterweil , Vasileios Pappas
Last updated 2012-08-26 (Latest revision 2012-02-23)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Due to the hierarchical tree structure of the Domain Name System [RFC1034][RFC1035], losing all of the authoritative servers that serve a zone can disrupt services to not only that zone but all of its descendants. This problem is particularly severe if all the authoritative servers of the root zone, or of a top level domain's zone, fail. Although proper placement of secondary servers, as discussed in [RFC2182], can be an effective means against isolated failures, it is insufficient to protect the DNS service against a Distributed Denial of Service (DDoS) attack. This document proposes to reduce the impact of DDoS attacks against top level DNS servers by setting long TTL values for NS records and their associated A and AAAA records. Our proposed changes are purely operational and can be deployed incrementally.

Authors

Eric Osterweil
Vasileios Pappas

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)