On Oct 16, 2006, at 9:16 AM, Peter Koch wrote:

Dear WG,

the final IETF 67 agenda was published earlier today. We kept our slot:

        FRIDAY, November 10, 2006
        0900-1130 Morning Session I
        OPS   dnsop     Domain Name System Operations WG

A version 0 dnsop agenda is available from
<http://www3.ietf.org/proceedings/06nov/agenda/dnsop.txt>

Please send agenda item suggestions to Rob and me soon. The draft agenda is
due Wednesday next week:

I am blocked by your provider. : (

Is there interest in reviewing-

http://www.ietf.org/internet-drafts/draft-otis-spf-dos-exploit-01.txt

SPF/Sender-ID never requires SMTP client validation while demanding extensive DNS resources aimed at authorizing one or more email- addresses within an email message. (The suggested alternative approaches are not relevant to DNS operation and were added only to illustrate that there are safe alternatives.)

SPF/Sender-ID represents a substantial amplification exploit that also facilitates an attack intent on poisoning DNS. This threat represents concerns that should be relevant to this WG. An SPF related attack will not be obvious in any logs. The source of the attack can not be identified or stopped with ACLs and BCP38 offers no protection in this case either.

-Doug



.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to