Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-18 Thread David Conrad
On Aug 18, 2008, at 8:22 PM, Masataka Ohta wrote: You mean all the DNSSEC clients should directly ask authoritative nameservers Yes. and all the firewalls preventing so should be modified. The vast majority of firewalls allow 'connections' (even UDP ones) to be initiated from the inside.

Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-18 Thread Masataka Ohta
Paul Wouters wrote: > (distributed) point to point encryption (or validation) is the future! It's no future. > I see no problem for port 53 through NAT's. NAT often captures and modifies packet to port 53. > But really, so many desktop applications > do direct DNS now themselves with disregard

Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-18 Thread Paul Wouters
On Tue, 19 Aug 2008, Masataka Ohta wrote: You mean all the DNSSEC clients should directly ask authoritative nameservers and all the firewalls preventing so should be modified. (distributed) point to point encryption (or validation) is the future! Let's assume all the clients agree with you a

Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-18 Thread Masataka Ohta
David Conrad wrote: >> If a caching server is required to perform public key computation to >> verify RRs before caching, it can't support much clients and will be >> a so easy victim of DDOS. > > > Hence, one of the reasons for the desire to push DNSSEC towards the end > user. You mean all t

Re: [DNSOP] Cache poisoning on DNSSEC

2008-08-18 Thread David Conrad
On Aug 18, 2008, at 5:21 PM, Masataka Ohta wrote: The fact is DNSSEC is the *only* game in town for preventing cache poisoning. Not at all. Which game do you propose? If a caching server is not required to perform public key computation to verify RRs before caching, ... Then the caching s

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Mark Andrews
> On Mon, Aug 18, 2008 at 01:45:43PM -0400, Brian Dickson wrote: > > The problem, I think, is TCP itself, not TCP support within > > implementations. E.g. resource limits per IP address (16 bits of port > > number) don't scale to current-size Internet scale. > > It is possible to host >10 c

[DNSOP] Cache poisoning on DNSSEC

2008-08-18 Thread Masataka Ohta
Jim Reid wrote: > The fact is DNSSEC is the *only* game in town for preventing cache > poisoning. Not at all. If a caching server is not required to perform public key computation to verify RRs before caching, cache poisoning won't be detected by the caching server, average clients of which su

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
> Bad example. One of the reasons we don't see more crypto per default on > web browsing is precisely the limitations of SSL/CA's on using SSL with > virtual host web sites. I'd hardly call the lack of port 443 a success > story. we don't need a reason to deprecate tcp/53 beyond what's written in

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-18 Thread David Conrad
Andrew, On Aug 18, 2008, at 6:29 AM, Andrew Sullivan wrote: When the CTO receives the incident report, the CTO is going to say, "So if we never turned on DNSSEC, this wouldn't have happened? Ok. New policy: no DNSSEC." In today's Internet, most network engineers (at least at real compani

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread bert hubert
On Mon, Aug 18, 2008 at 06:11:14PM -0400, Paul Wouters wrote: > >It is possible to host >10 connections on 1 IP address and 1 port, and > >this happens in practice. Think, again, of webservers, which all have to > >listen on port 80, yet support lots of clients simultaneously. > > Bad example.

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Wouters
On Mon, 18 Aug 2008, bert hubert wrote: On Mon, Aug 18, 2008 at 01:45:43PM -0400, Brian Dickson wrote: The problem, I think, is TCP itself, not TCP support within implementations. E.g. resource limits per IP address (16 bits of port number) don't scale to current-size Internet scale. It is po

Re: [DNSOP] Fwd: Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Paul Wouters
On Mon, 18 Aug 2008, Joe Baptista wrote: No.  I was thinking more of a smart porcupine with attitude.  At least use the IDS to notify the system administrator an attack is in progress.  I've attached a document that uses snort to log the event.  That could be used to notify the system administ

Re: [DNSOP] Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Paul Wouters
On Mon, 18 Aug 2008, Andrew Sullivan wrote: avoid susceptibility to DoS." Or something like that. After all, resource-exhaustion attacks are also possible against DNSSEC-oblivious systems. DNSSEC does open a new line of such attack, and one needs to provision for it. No? A factor of 100 is

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
> > what would it do if it had a TCP-forbidding firewall between it and its > > RDNS? > > Dunno, but when PowerDNS had TCP bugs in its resolver code, all the > complaints I got were from Exchange users. they'll cope. > What's the rush with deprecating DNS/TCP btw? It languished in the shade for

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread bert hubert
On Mon, Aug 18, 2008 at 07:49:20PM +, Paul Vixie wrote: > > > so what does microsoft exchange do when it tries to talk to a tinydns > > > service like everydns.net who doesn't implement TCP/53 at all? > > > > It doesn't need to - it speaks to resolvers. > > what would it do if it had a TCP-fo

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread bert hubert
On Mon, Aug 18, 2008 at 01:45:43PM -0400, Brian Dickson wrote: > The problem, I think, is TCP itself, not TCP support within > implementations. E.g. resource limits per IP address (16 bits of port > number) don't scale to current-size Internet scale. It is possible to host >10 connections on

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
> Paul's original proposal, C (if I interpret it correctly) applies to > resolver<->authority-server communications, not stub<->resolver > communications. no, i was pretty much ruling them out period. especially (RA=1 AND RD=0). however, i could accept a SHOULD NOT for ADNS vs. a SHOULD for

Re: [DNSOP] Fwd: Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Ted Lemon
On Aug 18, 2008, at 12:51 PM, Joe Baptista wrote: No. I was thinking more of a smart porcupine with attitude. At least use the IDS to notify the system administrator an attack is in progress. I've attached a document that uses snort to log the event. That could be used to notify the syst

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Brian Dickson
bert hubert wrote: The server I mean by the way is microsoft exchange, which likes to do DNS over TCP. so what does microsoft exchange do when it tries to talk to a tinydns service like everydns.net who doesn't implement TCP/53 at all? It doesn't need to - it speaks to resolvers.

Re: [DNSOP] Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Andrew Sullivan
On Mon, Aug 18, 2008 at 01:56:09PM -0400, Dean Anderson wrote: > DNSSEC caches that verify are subject to a crypto-overload attack by > large numbers of queries. Surely another way to express the same thing is, "DNSSEC-enabled servers and caching recursors require many more resources in order to

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread bert hubert
On Mon, Aug 18, 2008 at 07:20:16PM +, Paul Vixie wrote: > > We've just had it easy over the past years, and it shows. > > it *can't* scale. laws of physics. 'When a distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that someth

Re: [DNSOP] Fwd: Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Ted Lemon
On Aug 18, 2008, at 11:26 AM, Joe Baptista wrote: The best way to secure DNS recursive servers is to integrate a smart IDS and firewall solution. Hard shell, gooey interior? You're kidding, right? ___ DNSOP mailing list DNSOP@ietf.org https://www.

[DNSOP] Fwd: Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Joe Baptista
On Mon, Aug 18, 2008 at 12:02 PM, Paul Hoffman <[EMAIL PROTECTED]>wrote: > At 1:27 PM +0100 8/18/08, Jim Reid wrote: > >> The fact is DNSSEC is the *only* game in town for preventing cache >> poisoning. >> > > Note the subject of this particular thread. A more carefully-worded > sentence would be

Re: [DNSOP] Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Dean Anderson
On Mon, 18 Aug 2008, Paul Hoffman wrote: > At 1:27 PM +0100 8/18/08, Jim Reid wrote: > >The fact is DNSSEC is the *only* game in town for preventing cache poisoning. > > Note the subject of this particular thread. A more carefully-worded > sentence would be "The fact is DNSSEC is the *only* game

Re: [DNSOP] Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Dean Anderson
On Mon, 18 Aug 2008, Jim Reid wrote: > On 18 Aug 2008, at 05:11, Dean Anderson wrote: > > > Ok, I agree that totally DNSSEC-oblivious servers won't be a problem > > for DOS, but of course remain susceptible to poisoning even if the > > stub resolver and the authority server both implement DNSSEC.

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread bert hubert
On Mon, Aug 18, 2008 at 05:27:24PM +, Paul Vixie wrote: > TCP/53 a redheaded stepchild and its uses are all dangerous or unscalable. > (that initiators do the close, and that responders have a minimum 2-minute > timeout, says that any conformant implementation can be slapped down hard > with a

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Brian Dickson
bert hubert wrote: On Mon, Aug 18, 2008 at 04:34:30PM +, Paul Vixie wrote: and let's also make explicit that TCP is not to be used unless UDP returns TC or unless QTYPE=AXFR or unless UDP QTYPE=IXFR returned only one SOA. This means disabling one of the more widely used MTAs. Cou

Re: [DNSOP] DNS over TCP *currently* does not scale

2008-08-18 Thread Dean Anderson
On Mon, 18 Aug 2008, bert hubert wrote: > On Sun, Aug 17, 2008 at 11:42:39PM -0400, Dean Anderson wrote: > > > TCP isn't susceptible to this kind of attack at all. TCP spoofing is > > While this is true, it turns out the current crop of authoritative > nameservers, including mine, is not up to s

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-18 Thread Dean Anderson
On Mon, 18 Aug 2008, Paul Wouters wrote: > I wouldn't be using starbucks resolver, since i just installed my > own DNSSEC-aware resolver? Ordinarilly , when you get a DHCP-supplied nameserver from starbucks, your stub resolver directs its requests to that caching server. It is indeed possible th

Re: [DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread bert hubert
On Mon, Aug 18, 2008 at 04:34:30PM +, Paul Vixie wrote: > and let's also make explicit that TCP is not to be used unless UDP returns > TC or unless QTYPE=AXFR or unless UDP QTYPE=IXFR returned only one SOA. This means disabling one of the more widely used MTAs. TCP is a first class DNS citizen

[DNSOP] deprecating dangerous bit patterns and non-TC non-AXFR non-IXFR TCP

2008-08-18 Thread Paul Vixie
[EMAIL PROTECTED] (Paul Hoffman) writes: > At 4:46 PM +0200 8/18/08, Peter Koch wrote: >>Of course, one might claim that anybody using ANY in any production system >>(pun intended) gets what they deserve. > > Fully agree. Maybe a BCP document titled "Asking for ANY Considered > Unwise" would be u

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-18 Thread Paul Hoffman
At 4:46 PM +0200 8/18/08, Peter Koch wrote: Of course, one might claim that anybody using ANY in any production system (pun intended) gets what they deserve. Fully agree. Maybe a BCP document titled "Asking for ANY Considered Unwise" would be useful. --Paul Hoffman, Director --VPN Consortium

Re: [DNSOP] Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Paul Hoffman
At 1:27 PM +0100 8/18/08, Jim Reid wrote: The fact is DNSSEC is the *only* game in town for preventing cache poisoning. Note the subject of this particular thread. A more carefully-worded sentence would be "The fact is DNSSEC is the *only* game in town for completely preventing cache poisonin

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-18 Thread Peter Koch
On Fri, Aug 15, 2008 at 11:29:13AM -0700, David Conrad wrote: > However, because of DO, folks who don't configure their resolvers to > do DNSSEC shouldn't ever see any DNSSEC goop. so, one question is whether the "DO" bit actually signals understanding of the correct version of DNSSEC and what

Re: [DNSOP] A different question (was Re: Kaminsky on djbdns bugs (fwd))

2008-08-18 Thread Andrew Sullivan
On Fri, Aug 15, 2008 at 04:07:03PM -0700, David Conrad wrote: > intervention) or they'll turn off DNSSEC. So, in the worst case, they'll > get bitten and revert back to the same level of security (or lack thereof) > they have today. > > Is this worth blocking DNSSEC deployment? It seems to me

Re: [DNSOP] Pointless FUD and confusion about DNSSEC deployment

2008-08-18 Thread Jim Reid
On 18 Aug 2008, at 05:11, Dean Anderson wrote: Ok, I agree that totally DNSSEC-oblivious servers won't be a problem for DOS, but of course remain susceptible to poisoning even if the stub resolver and the authority server both implement DNSSEC. Kindly explain how is this any different from w

[DNSOP] DNS over TCP *currently* does not scale

2008-08-18 Thread bert hubert
On Sun, Aug 17, 2008 at 11:42:39PM -0400, Dean Anderson wrote: > TCP isn't susceptible to this kind of attack at all. TCP spoofing is While this is true, it turns out the current crop of authoritative nameservers, including mine, is not up to serving thousands of requests/second over TCP. Or at l