Nonsense.

I'm not sure exactly what sort of attack profile you have in mind at the 
registrar with a, but given that the TTL for DS records is generally 24 hours, 
most attacks at that level will create pretty widespread DNSSEC validation 
errors for at least that initial day. DNSSEC validation helps a great deal.

B & d are issues securing the first hop if validation is not done on the 
endpoint itself. Those are valid, but do not mean that DNSSEC validation 
provides no protection. It certainly protects against an array of cache 
poisoning attacks even in that configuration. And that's protection the clients 
would not otherwise have. It definitely makes it a lot harder to use DNS as an 
attack vector with nobody noticing. One layer of a layered approach.

C is certainly a problem if you don't validate on the end point and trust any 
random nameserver on any network to which you connect.

However, most enterprise clients and ISP users do tend to have a reliable and 
reasonably secure path to their first hop recursive nameserver. It's not nearly 
as secure as validating on the client, but it's much more secure than having no 
validation whatsoever.

Nor is DNSSEC validation a DOS vector. That's a non sequitur and frankly a 
pretty silly assertion. Yes, an organization can break their own authoritative 
DNS (which is related to signing not validation), but frankly DNSSEC is just 
one of many ways an organization can screw up DNS or anything else in their 
network. It's best to know what you're doing. Organizations will learn. If you 
haven't implemented DNSSEC validation yourself, you may not have noticed, but 
US government agency management of DNSSEC has improved greatly with experience. 
Outages due to error are less and less common and usually limited in scope when 
they occur. Since we've been validating all Internet responses for four years 
and counting now (and tend to interact quite a bit with other agencies), we 
have noticed the improvement. Refusing to return results when the authoritative 
DNS response fails validation is good thing, not a bad thing, even when it's 
the authoritative zone administrators who screwed up their own zone.

DNSSEC validation is not a panacea, but if you refuse to implement it you are 
denying your users one layer of protection you could pretty easily provide. And 
given that in the US the large majority of federal agency DNS authoritative 
zones are signed, you also can't claim there's no benefit to the US public from 
validation. Implementing validation on recursive nameservers does not protect 
users from every attack. Nothing does. Nor is it as good as performing 
validation at the client. But it is a solid first step with real security 
benefits. And it's a step that can be followed and built upon with further 
enhancements later.

Scott

-----Original Message-----
From: Nicholas Weaver [mailto:nwea...@icsi.berkeley.edu] 
Sent: Friday, March 13, 2015 3:08 PM
To: Morizot Timothy S
Cc: Nicholas Weaver; dnsop@ietf.org
Subject: Re: [DNSOP] [dns-operations] dnsop-any-notimp violates the DNS 
standards


> On Mar 13, 2015, at 10:21 AM, Morizot Timothy S <timothy.s.mori...@irs.gov> 
> wrote:
> It’s been steadily increasing for years now and gives me an idea what 
> percentage of the US public is protected against certain types of attacks 
> involving our zones. DNSSEC validation is not a panacea, but in a layered 
> approach toward combating fraud and certain sorts of attacks, it does provide 
> a particular sort of protection not available through any other means. 
> Whether or not ISPs sign their authoritative zones matters much less to us 
> than whether or not they implement DNSSEC validation on their recursive 
> nameservers. And that’s not a failure at all. By the measure above (which 
> isn’t perfect, but the best one available) roughly a fifth to a quarter of 
> the US public, the primary consumers of our zones, exclusively use validating 
> nameservers. That’s significant. Would I like to see it higher? Sure. But 
> I’ll take it.
> 

The problem is validation by the recursive resolver is nearly useless for 
security, but one heck of an effective DOS attack (NASA, HBO, etc)...

Lets look at what real world attacks on DNS are.

a:  Corrupt the registrar.  DNSSEC do any good?  Nope.

b:  Corrupt the traffic in-flight (on-path or in-path).  DNSSEC do any good?  
Only if the attacker is not on the path for the final traffic, but just the DNS 
request.

c:  The recursive resolver lies.  Why would you trust it to validate?

d:  The NAT or a device between the recursive resolver and the user lies.  
Again, validation from the recursive resolver works how?


Overall, unless you are validating on the end host rather than the recursive 
resolver, DNSSEC does a lot of harm from misconfiguration-DOS, but almost no 
good.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nwea...@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to