On Nov 20, 2003, at 2:00 PM, Ed Lewis wrote:
> Are you suggesting that there is a way to put data in DNS and be able
> to
> rely on it for security?  (The double negation is playing tricks with
> my
> head.)

No.   I am saying that information in the DNS can be a useful hint
about whether or not something is fraudulent in some cases, for some
attacks.   The threat model for spam and email viruses is that a very
wide set of targets, chosen with no discrimination, are attacked with
well-formed, forged messages.   The attacker knows nothing about the
victim.   Large-scale forging of DNS records to facilitate such an
attack is perhaps theoretically possible, but unlikely.   And since the
alternative to this protection mechanism is that the attack definitely
succeeds, it's acceptable if the protection mechanism is not 100%
reliable.

> A lot of services have relied on matching forward and reverse records
> for authenitcation of the client, but this is seen as weak.  So much so
> that the "in-addr required" draft can't state this as a reason that the
> reverse map is important to have.

When the degree of desired protection is 100%, and failure is a
disaster, you are absolutely right.   The degree of success that's
needed here is not 100%, though, and failure is the status quo, so the
analogy fails.
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to