On Oct 16, 2006, at 9:16 AM, Peter Koch wrote:
Dear WG,
the final IETF 67 agenda was published earlier today. We kept our
slot:
FRIDAY, November 10, 2006
0900-1130 Morning Session I
OPS dnsop Domain Name System Operations WG
A version 0 dnsop agenda is available from
<http://www3.ietf.org/proceedings/06nov/agenda/dnsop.txt>
Please send agenda item suggestions to Rob and me soon. The draft
agenda is
due Wednesday next week:
I am blocked by your provider. : (
Is there interest in reviewing-
http://www.ietf.org/internet-drafts/draft-otis-spf-dos-exploit-01.txt
SPF/Sender-ID never requires SMTP client validation while demanding
extensive DNS resources aimed at authorizing one or more email-
addresses within an email message. (The suggested alternative
approaches are not relevant to DNS operation and were added only to
illustrate that there are safe alternatives.)
SPF/Sender-ID represents a substantial amplification exploit that
also facilitates an attack intent on poisoning DNS. This threat
represents concerns that should be relevant to this WG. An SPF
related attack will not be obvious in any logs. The source of the
attack can not be identified or stopped with ACLs and BCP38 offers no
protection in this case either.
-Doug
.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html