On Thu, 4 Jan 2007, Edward Lewis wrote: > At 13:15 -0500 1/4/07, Dean Anderson wrote: > > >address by the machine initiating the query". This incorrect assertion > >is at the very heart of the mistaken uses of 'reverse DNS as security > >mechanism'. The correct answer to "what is supposed to be seen" is > >_site_ dependent. Those who think there is some "universally correct" > >answer have no legitimate foundation for that belief. They are really > >just trying to impose their _site's_ practices on everyone else in the > >belief that if everyone else did what they did, they could use reverse > >DNS for security or anti-spam or some such. The ends, however, cannot > >be achieved even if everyone were to adopt their practices. [ignoring > >the fact that some sites cannot adopt those practices and have very good > >reasons for their different practices.]
> I can speak to the motivation of this because I think I was the one > that suggested the words. > > The motivation had nothing to do with security. Your point is well > taken and I agree that there is little value in the reverse map in > providing security. (Arguably, some value, not enough to justify the > expense certainly.) Hmm. So, the word change had nothing to do with security. The draft and its advocates _do_ still assert that there is security in matching forward/reverse. The IETF can't change their belief, but it can avoid the use of vague language with dual interpretations that is designed to support that belief. > But the vagueness ot the text is borne from other observed uses of > DNS, for example Akamization and what some call "directional DNS". > There are folks that purposefully answer differently based on where a > query comes from. It can be argued that these folks are violating > coherency and they can retort that no, they are abusing dynamic update > (with a wink). Whatever, it happens, and we need to recognize reality > and not try to argue theory. Akamization or (directional DNS) has nothing to do with reverse DNS. They give out different A records depending on the query source. Frankly, I can see nothing wrong with this, either. Some people object to this practice, but their objection can't be founded in the text of existing DNS RFCs. The coherency argument is a red-herring, since a long-cached record only "hurts" akamai, not anyone else. Akamai, etc can give out 0 TTL records to avoid that, if they choose to. It doesn't seem that transforming the in-addr draft will provide text that makes this behavior non-standard. If that is the goal of this draft, then it is really coming in "under the radar". I don't read the text of this draft as affecting directional DNS. > The other scenario I had in mind was split-DNS, in which I answer > with more detail to my own machines than the Internet. Such as - > Inside: 8.88.888.202.in-addr.arpa PTR amadeus.perl.example. > Outside: 8.88.888.202.in-addr.arpa PTR machine888888.perl.example. > > The "outside" isn't always to hide the inside machine's true > identity, but this makes transitions inside transparent to the > outside. Especially if the inside is using some kind of dynamic > update via DHCP and I just don't want to deal with that headache > outside my firewall. {suggestion: run two sets of nameservers, one set with public information, and another set with inside information} Regarding the draft: Same as above for directional DNS. The split-dns purpose seems to be "under the radar", and the text of this draft doesn't seem to alter the issue of split-DNS. > I think you are right in discounting the notion of "universally > correct" answers. But if so, I would think you would even more agree > with the words as stated. You are discussing issues of "universial consistency" of many/all types of records. I am concerned about the definition of "correct PTR response". -- Av8 Internet Prepared to pay a premium for better service? www.av8.net faster, more reliable, better service 617 344 9000 _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www1.ietf.org/mailman/listinfo/dnsop