On Feb 19, 2007, at 11:56, Edward Lewis wrote:
At 11:34 +0000 2/19/07, Jim Reid wrote:
Right. But it depends on what's meant by "extra measures". IMO
it's more than
reasonable to have a default that says "don't do reverse lookups
of 1918
addresses on the Internet". This would be a Very Good Thing. If
this was in
place, the extra measures would then be for someone using 1918
addressing to
switch off that default and properly configure their server for
the local
network.
I disagree about the "Very Good Thing."
If I am using RFC 1918 space locally I will use those addresses in
my local forward DNS and have a local reverse DNS. My remote-
facing DNS will not have those addresses and hence not have any
reverse zones.
Part of the problem is that the DNS server doesn't know if it is
doing "reverse lookups of 1918 addresses on the Internet" or if it
is doing reverse lookups of 1918 addresses on the company Intranet.
Which in the final analysis is a matter of configuration. Which is
where this needs to be done anyway because it depends on local
policy. For the scenario you describe, this needs to be done no
matter what default exists or doesn't exist.
You simply have to tell your server whether it's resolving local or
"public" 1918 space. Or not resolving it at all.
IMO, it's better if there's a sensible default configuration -- for
some definition of sensible -- that works "right out the box". This
has to be an improvement on leaving things undefined, usually
misconfigured and DNS administrators in complete ignorance of the
problems that this misconfiguration causes for others.
In a way this parallels the early days of inetd. Once upon a time
this was shipped with a default config file that had everything
enabled. Admins mostly left inetd.conf alone because they assumed it
was set up the way the OS vendor wanted. Nowadays, everything is
usually switched off by default, forcing the admin to make a
conscious decision to enable service: ie implicitly define and
implement local policy. Why can't we learn from that experience?
Sorry folks if I'm being dense or just ornery about fooling with
Mother Nature here. If you start bending the DNS protocol to route
around damage in other parts of the network architecture, you'll be
weakening one more element.
I fail to see how changing -- I'd say defining -- the default
behaviour of a name server in this way could possibly be a protocol
issue.
Another desirable default resolver configuration would be to refuse
recursive queries from non-local addresses.
How? What's local? What's not local? Do you want to see the name
server be required to also speak the local routing protocols to
determine what's inside and what's outside?
Ed, you're being ridiculous. All I was suggesting here was, in BIND
terms, making "allow-recursion { localnets; };" the default. This has
to be preferable to the current situation of a free-for-all for
everyone. If that default isn't right, then the admin is required to
make a conscious act to make the server comply with local policy.
Which they should be doing anyway of course. Where's the harm?
Remember that the more you stuff into the configuration files, the
more you are going to cost the operators that have to manage the
configurations.
True enough. But there are trade-offs here. Tweaking a handful of
config file options is a one-off cost. And has the side-effect of
minimally documenting local policy, if only through reading the
config file. The consequences of bad defaults and undefined
configurations leaves many name servers creating all sorts of
trouble. Worse, the trouble is for others and the local DNS admin is
blissfully unaware of that. ISTR 40-60% of root server traffic would
go away if people using 1918 addressing configured their name servers
properly. IMO this WG shouldn't wash its hands of this problem,
claiming its a protocol issue and not an operational one. Which is
what you appear to suggesting Ed. I hope not.
First let's talk about whether it is a problem to have RFC 1918
space exposed as an address for a nameserver.
It is.
Second, let's talk about the severity, and is there some real
threat to others if someone does this.
There is.
Third, then let's talk about placing safeguards up.
I refer you to my previous posting. :-)
_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop