Mark Andrews <ma...@isc.org>于2018年2月3日周六 上午4:11写道:

> The problem is that search lists are being applied when “localhost” is
> being entered into name lookup APIs and is being matched against
> localhost.example which isn’t expected to  to a address on the current
> machine and that the search list may be auto constructed or come from a
> untrusted source.
>

If only consider about http: http://seclists.org/bugtraq/2008/Jan/270
Web browser can also ban this "localhost.example".
CA Single Sign-On might help to solve the "same site" cookie expose problem.


> There is also a small risk that hotspots will return something other than
> a local address if a address lookup for .localhost is made.
>
> This is all in the context of processing  urls.
>
> Localhost is the last remanent of the pre hierarchical host scheme.
>
> The risks are eliminated if the name APIs use local lookup sources in
> those contexts.
>
> Then you have legacy clients. As long as the servers for the namespace on
> the public Internet don’t return A or AAAA records for localhost the issue
> is addressed there.
>
> You then have the recursive server where you would like it, by default,
> return a answer without contacting the root servers.  The only safe way to
> do that is to have it serve a empty zone for localhost.  As this zone isn’t
> linked into the global DNSSEC chain of trust the root zone needed a
> insecure delegation for localhost.
>
>
>
> --
> Mark Andrews
>
> On 3 Feb 2018, at 05:25, Bob Harold <rharo...@umich.edu> wrote:
>
>
> On Thu, Feb 1, 2018 at 4:26 PM, Ted Lemon <mel...@fugue.com> wrote:
>
>> On Feb 1, 2018, at 2:48 PM, Andrew Sullivan <a...@anvilwalrusden.com>
>> wrote:
>>
>> As a general principle, when what the RFC says to do is not the right
>> thing to do, the solution is to update the RFC, not to ignore the problem.
>>
>>
>> I strongly agree with this (as I think or anyway hope you know)
>>
>>
>> Yes, I will admit I was a bit surprised that you put it that way,
>> although as you say, your position is more clear in your formal review of
>> the document.
>>
>> As for why I responded to this and not to the formal review, the answer
>> is that the formal review was a bit overwhelming.  You made a lot of
>> assertions of fact that didn't sound like fact to me—they sounded like
>> strongly-held opinion.   You are a much more experienced DNS expert than I
>> am, so for me to argue you away from those opinions is a tall order—I don't
>> think you've really expressed the underlying belief that is the keystone to
>> the whole edifice.
>>
>> The problem I have is that to me it's dead obvious that the name
>> hierarchy and the set of names in the DNS are not the same thing.   We've
>> had that discussion before.   We even published a document about it, which
>> hasn't quite made its way out of the RFC editor queue yet.   It seems to me
>> that it is demonstrably the case that these two sets are disjoint.
>>
>> But you explain your reasoning on the basis that clearly they are the
>> same set, and *that* they are the same set is left unexamined.   So if
>> we were to succeed in understanding why we disagree on this point, it would
>> be necessary to dig down into that.
>>
>> Having seen you give keynotes at the plenary, I know that you are deeply
>> concerned about computer security.   The reason that I am in favor of the
>> behavior I'm propounding is that I think it closes a small security gap
>> through which a truck might some day be driven, to our woe.   So to me, the
>> need to leave that gap, which I admit is small, open, seems inconsistent
>> with what I know of you.
>>
>> So clearly you value this idea that localhost is a name that exists in
>> the DNS, even though it doesn't exist in the DNS.   It might be fruitful to
>> explore that further.   It might also be a waste of time.   I don't
>> honestly know.   But that is, I think, the key to our disagreement.
>>
>
>
> Could someone explain the security problem?  If it really is bigger than
> the problems that will be caused by changing resolvers to answer with
> NXDOMAIN, then you might convince me.
>
> --
> Bob Harold
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
-- 
致礼  Best Regards

潘蓝兰  Pan Lanlan
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to