I've done a little more digging on the Kerberos use case.

Here's an email thread from discussion whether to change the default
behavior:
http://mailman.mit.edu/pipermail/kerberos/2011-July/017313.html

The one person who explained his use cases also later said (in all caps) he
knew it needed to change eventually.

And here's the RFC saying it's wrong: rfc4120 (from that thread).

Lee



From:  George Michaelson <g...@algebras.org>
Date:  Wednesday, November 12, 2014 6:07 AM
To:  Dan York <y...@isoc.org>
Cc:  Warren Kumari <war...@kumari.net>, Lee Howard <l...@asgard.org>, DNSOP
WG <dnsop@ietf.org>
Subject:  Re: [DNSOP] Using PTRs for security validation is stupid

> The irony in SSH is that its a two way strongly authenticated connection.
> (assuming you do client keys) -So perhaps the sense of the story is that where
> proof-of-identity is innately part of the exchange, it makes little sense to
> deploy a barrier to entry like PTR checking, since you are using significantly
> better protections against the wrong person being given access.
> 
> PTR records permit IP address administrators with access to DNS configurations
> to associate DNS names with their addresses. The informative value this has
> should not be conflated with any stronger checks, and adds little to the
> decision to accept a connection to a service beyond the log value of the
> address holders assertion. If you chose to demand a forward-reverse
> association to exist, you are very likely to exclude access in situations you
> did not wish to.
> 
> -G
> 
> On Wed, Nov 12, 2014 at 5:59 AM, Dan York <y...@isoc.org> wrote:
>> Lee, 
>> 
>> Warren, in his own unique style, made a point that I was wondering about...
>> 
>> On Nov 11, 2014, at 9:30 PM, Warren Kumari <war...@kumari.net> wrote:
>> 
>>>> I heard applause during the WG meeting in response to these statements;
>>>> sounded like consensus to me. I said I would check that consensus on list.
>>> 
>>> I think that there is consensus that it is stupid. There is also
>>> consensus that using a fork to get the stuck toast out of the toaster
>>> is a bad idea -- however....
>> 
>> ... namely that I think probably all of us on the list can agree 100% that
>> having SSH servers reject connections from IP addresses without PTRs is
>> stupid.   I haven't seen anyone chime in publicly that they think it *is* a
>> good idea... and I doubt we will.
>> 
>> But now what?
>> 
>> I'm not sure that there's necessarily a whole lot of value in us coming out
>> with a document "Using PTRs To Reject SSH Connections Considered Harmful" - I
>> don't know that our doing so will necessarily motivate the authors of SSH
>> servers to change anything. Certainly I think the SSH case could be listed in
>> your document of bad things people do with PTRs in IPv4 that will break in
>> IPv6.
>> 
>> Where are you trying to go with this note about consensus?
>> 
>> A bit puzzled,
>> Dan
>> 
>> --
>> Dan York
>> Senior Content Strategist, Internet Society
>> y...@isoc.org   +1-802-735-1624 <tel:%2B1-802-735-1624>
>> Jabber: y...@jabber.isoc.org
>> Skype: danyork   http://twitter.com/danyork
>> 
>> http://www.internetsociety.org/deploy360/
>> 
>> 
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>> 
> 


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to