>>>>> On Fri, 19 Jan 2007 01:10:46 +0900, 
>>>>> JINMEI Tatuya <[EMAIL PROTECTED]> said:

>> Dean Anderson argued that a proposed text change he offered be
>> included instead of some language that is already in
>> draft-ietf-dnsop-reverse-mapping-considerations-01.txt.  His argument
>> is that his proposed text "is clear and specific, and it resolves the
>> ambiguity in your descriptions."

>> I would like to defer to the group on this question.  I am not so far
>> convinced that Dean's formulation is clearer, more specific, or less
>> ambiguous than the language that is in the draft at present, but I
>> would like to hear an argument from anyone other than Dean who thinks
>> it is.  If no such argument is forthcoming, then I plan to leave
>> alone the language in the draft about the implications of relying on
>> the reverse tree for security.

> It's difficult to answer the question with yes-or-no since the
> previous discussion seems to diverge, covering many subtle points, but
> I'm afraid I share with some of the concerns raised in the
> discussion.  I've carefully reread every line of the 01 version, and
> found that my concerns are not really addressed (of course, I'm not
> claiming it must necessarily be addressed).

> Right now, I don't have time to provide further details in an e-mail
> message, but I'll post my own comments to the 01 version by early next
> week, which will probably be related to this issue.

So, here are my own comments.  Sorry, this is pretty lengthy...I hope
I'm at least clear enough.

Overall, I cannot be sure what exactly are recommended and why they
are in Section 4.  In particular, I don't understand the logic towards
the following recommendation in Section 4.1 (3rd paragraph):

   All IP addresses in use within a block should have a reverse mapping.

Perhaps the rationale behind it is an observation that there may be
some useful cases where a reverse mapping helps or is necessary.  But
most of the concrete examples given in the draft do not lead to such a
strong recommendation:

- for "protocols that could benefit from accurate reverse mapping
  data" (quoted from Section 1.3), specifically
  [RFC4025]/[RFC4255]/[RFC4322], it should be sufficient to provide
  reverse mappings for those hosts that are involved in the protocols;
  we don't need a reverse mapping for other types of hosts, i.e., a
  host that is not an IPsec security gateway or an SSH server or an
  IKE responder.  Actually, it seems to me the situation is the same
  as that of forward mapping - we usually need a forward mapping for
  hosts that provide some well-known services and are expected to be
  connected from other nodes, and we don't need to provide a forward
  mapping for other hosts (we may provide it, of course).

- the situation is also the same for traceroute (section 3.1, last
  paragraph).  It might be useful to know the "host name" of
  intermediate routers (which often provides some intutive information
  - which may not be very trustworthy though - of the network
  topology), but I think we don't usually rely on the reverse mapping
  result for numerous end devices, especially those that do not
  provide any well-known services.

  BTW, while the draft states when a reverse mapping is missing "the
  traceroutes take longer", I don't think this is very accurate.  As
  long as the corresponding reverse mapping zone is properly
  maintained (*somewhere* under in-addr.arpa or ip6.arpa), traceroute
  should work fast enough without host name information.  Of course, a
  lame-delegation type of "missing" may make it take longer, but I
  don't think this sentence specially talks about that case.

  Or perhaps it refers to delays due to a slow link such as dialup in
  conjunction with lack of negative caching (Section 3.1, 3rd
  paragraph of page 4)?  If so, I don't think it's really a fair
  argument: first, such a delay or increased server load also happens
  for existing reverse mappings especially for some initial queries.
  Second, I believe negative caching is already pretty mature in
  caching server implementations (standardization-wise, RFC2308
  defined the usage almost 9 years ago, which is 4 years before
  RFC3363 finally recommended ip6.arpa + nibbles for IPv6 reverse
  mapping); if we discuss effects such as delay or load by assuming
  lack of such a matured feature, we could also argue that trying to
  resolve reverse mappings can cause a delay or increased server load
  in conjuction of lack of caching (either positive or negative),
  whether the mapping exists or not.

- I believe the same argument applies to the "delayed response" part
  of log analysis (section 3.1, second to last paragraph).  I'm not
  sure how substantial a missing reverse map is for statistics
  packages that try to resolve it, but I suspect they will simply work
  with textual addresses in such a case.

So, it seems to me that the only essential background that results in
the "strong recommendation" is "FTP (or telnet) sites simply rejecting
user sessions without a reverse mapping", "web sites verifying the
client's location using reverse mapping", or "TCP wrappers rejecting
clients that don't have reverse mapping", or "anti-spam systems
performing reverse-forward match tests to reject mail that does not
pass the test", etc.  That is, it seems the primary motivation of the
recommendation is, perhaps implicitly, to endorse such "security"
usage of reverse mappings.

If that were the real intent (I don't think so based on the discussion
in this thread so far), I'd be confused because in section 4.3 this
same document actually (at least to some extent) discourages such
usage: "The use of reverse mapping does not usually improve security,
and should not be a default policy."  I guess this confusion I'm
feeling is related to the issues raised in the "ambiguity" thread.

One expected explanation is that "some administrators don't accept the
recommendations (in this case "do not rely on reverse mappings for
security purposes that do not actually improve security") anyway, so
it's more realistic to consider how to deal with them (in this case
providing reverse mappings for all IP addresses "in use").
Admittedly, there are such administrators.  But if our action is to
let such admins do what doesn't really make sense and to recommend
others to adapt themselves for the convenience of the stubborn admins,
I don't see much importance in this effort; a stubborn admin will do
whatever they want anyway regardless of "technically sound"
recommendations from the IETF, whether it's not relying on reverse
mappings for non-secure purposes or it's providing reverse mappings
for all IP addresses.  I thought the IETF should primarily make
recommendations based on what is technically sound, and then (if still
necessary) consider compromises to deal with evil things.

Based on this opinion, my general proposal for section 4 is:

- recommend that RIR or LIR (or any organization that delegates IP
  address blocks) should provide appropriate reverse mapping
  delegations as well so that users who are delegated the address
  blocks can provide any reverse mappings that they want to publicize.

- not recommend "all IP addresses in use within a block have a reverse
  mapping."  In addition, we might clarify it's up to the site
  administrator which part of the their addresses should have reverse
  mappings.

- a bit more strongly discourage relying on the use of reverse
  mappings for "security" purposes that do not really improve
  security, clarifying those include reverse-forward matching or
  rejecting FTP/telnet/SMTP requests based on the (non)existence of
  reverse mapping or failure in reverse-forward match.

- and then (if still necessary) note that some administrators will
  still ignore the recommendations and continue relying on reverse
  mappings for the "security" purposes, and that other site
  administrators may want to provide more reverse mappings as an
  intermediate solution to deal with such "security-conscious" admins.

I also have related comments on other sections, but I'm stopping here
at the moment since I guess it's already pretty controversial.  If we
cannot agree on these fundamental points, the other comments on other
sections will probably meaningless.

Thanks,

                                        JINMEI, Tatuya
                                        Communication Platform Lab.
                                        Corporate R&D Center, Toshiba Corp.
                                        [EMAIL PROTECTED]

p.s. it's undoubtedly too early, but I'm copying below what I'd
envision in section 4 based on my opinions described above, just to be
concrete along with the actual text.

4. Recommendations

4.1 Delegation considerations

   It is desirable that Regional Registries and any Local Registries to
   whom they delegate should ensure the delegation of corresponding
   reverse mappings to the delegated organizations.

   Network operators should define and implement policies and procedures
   which delegate reverse mappings to their clients who wish to run
   their own reverse tree DNS services.  By the same token, network
   operators should provide reverse mapping for those users who do not
   have the resources to do it themselves.

4.2 Application considerations

   Applications should not rely on reverse mapping for proper
   operation, although functions that depend on reverse mapping (such
   as [RFC4025]) will obviously not work in its absence.  When the use
   of reverse mapping is optional for an application, the default
   configuration should be to turn it off.

   Operators and users are reminded that the use of the reverse tree,
   sometimes in conjunction with a lookup of the name resulting from
   the PTR record, provides no real security, can lead to erroneous
   results and generally just increases load on DNS servers. Further,
   in cases where address block holders fail to properly configure
   reverse mapping, users of those blocks are penalized.

4.3  Usage and deployment considerations

   Site administrators are encouraged to think carefully before
   adopting any test of reverse delegation, and are generally
   discouraged to employ such a test, particularly when that test is
   intended to improve security.  The use of reverse mapping does not
   usually improve security, and should not be a default policy.
   Those improper applications of reverse mapping include rejecting
   connection attempts due to lack of reverse mapping or mismatch of
   reverse and forward mappings.

   This test not only fails to reject many attempts of invalid access,
   but also rejects legitimate request from innocent users.  For
   example, some users continue to report difficulty in ensuring
   correct management of the reverse tree by upstream providers, in
   which case the users cannot provide the required reverse mapping
   even if they want to do so.  Also, adding a very large number of
   PTR records for a given reverse mapping can make providing reverse
   mappings ineffective; in particular, sites where a very large
   number of "virtual" host names resolve to the same host may force
   DNS responses to use TCP.  Thus, complete connection rejection on
   the basis of missing reverse mapping should be regarded as a last
   resort.

   In general, site administrators have the right to decide whether or
   not they provide reverse mappings for addresses they are using, and
   in case they do, the right to decide for which part of the
   addresses they provide the mappings.  However, the administrators
   are cautioned that administrators at other sites sometimes use
   reverse mapping as one of several pieces of evidence in evaluating
   connection traffic, particularly in the context of mail systems and
   anti-spam efforts.  Even though such us of reverse mapping should
   usually be discouraged especially when it results in rejecting
   connection attempts, administrators who believe in this type of
   "security" will continue relying on it for the moment.  Thus, until
   the day the improper reliance of reverse mapping is fully
   obsoleted, an administrator who owns an IP address block may need
   to consider providing more reverse mappings than those that are
   really necessary.

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to