On 26-Oct-2006, at 13:34, Peter Koch wrote:

this message initiates a working group last call for

        "Preventing Use of Recursive Nameservers in Reflector Attacks"
                draft-ietf-dnsop-reflectors-are-evil-02.txt

to be published as a BCP. The WGLC will end Sat, 2006-11-11 23:59 UTC.

Please review and comment on this draft on this mailing list. The chairs
will not forward the document to the AD unless at least five reviewers
have indicated their support (for both the draft and the intended status). Vendors' indication to follow (or not) the recommendation would be appreciated.

I have just reviewed this version of the document, and I support its publication as BCP as-is.

If another version is rolled for some reason, I would modify section 3, replacing the following text:

   o  Use TSIG [RFC2845] or SIG(0) [RFC2931] signed queries to
      authenticate the clients.  This is a less error prone method,
      which allows server operators to provide service to clients who
      change IP address frequently (e.g. roaming clients).  The current
      drawback of this method is that very few stub resolver
      implementations support TSIG or SIG(0) signing of outgoing
      queries.  The effective use of this method implies in most cases
running a local instance of a caching nameserver or forwarder that
      will be able to TSIG sign the queries and send them on to the
      recursive nameserver of choice.

with something like this:

   o  Use TSIG [RFC2845] or SIG(0) [RFC2931] signed queries to
      authenticate the clients.  This provides stronger authentication
      of clients than access lists based on query source addresses,
      and also facilitates access by authorised clients whose IP
      addresses change unpredictably (e.g. roaming clients). Practical
      drawbacks to this approach include the problem of key
      distribution, the requirement for clients and servers to have
      synchronised clocks, and the lack of deployed resolver
      implementations which support either TSIG or SIG(0).

Specifically, I think that key distribution and time synchronisation issues should be mentioned, the frequency of IP address changes is not the real problem (it's the problem of predicting what addresses will be used), and that the comment about running a local forwarder is redundant given the comment about resolver implementations (and has the slight aroma of implementation-specific advice).

However, as I mentioned above, I support -02 being published as-is without these changes.

Please also include editorial comments; there will be a -03 anyway since
the current draft does not yet have an IANA considerations section.

I may be procedurally out-of-touch, but in a recent draft I was involved in editing that was also aimed at BCP and which was subject to a lot of IESG scrutiny, I was repeatedly criticised for including an "IANA Considerations" section which included the single sentence "This document requires no actions of the IANA".

I was told that if no actions are required, no IANA Considerations section is necessary.


Joe

.
dnsop resources:_____________________________________________________
web user interface: http://darkwing.uoregon.edu/~llynch/dnsop.html
mhonarc archive: http://darkwing.uoregon.edu/~llynch/dnsop/index.html

Reply via email to