Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-05-24 Thread Florian Weimer
* Daisuke HIGASHI: > draft-fujiwara-dnsop-fragment-attack-01: > >> 3. Current status >> >> [Brandt2018] showed that Linux version 3.13 and older versions are >> vulnerable to crafted ICMP fragmentation needed and DF set packet and >> off-path attackers can set some of authoritative

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-09 Thread Daisuke HIGASHI
draft-fujiwara-dnsop-fragment-attack-01: > 3. Current status > > [Brandt2018] showed that Linux version 3.13 and older versions are > vulnerable to crafted ICMP fragmentation needed and DF set packet and > off-path attackers can set some of authoritative servers' path MTU > size to 296.

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-04 Thread Mark Andrews
You specify a well known TSIG key (e.g. name=“.”, algorithm=hmac-sha256, key=<32-zero-bytes>) then you use it when you don’t have a more specific key. If the server support the WKK you will get back a TSIG signed response that can’t have been forged by a off path attacker if it matched the

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-04 Thread 神明達哉
At Mon, 04 Mar 2019 20:43:14 +0900 (JST), fujiw...@jprs.co.jp wrote: > > - Section 3 > > > >Linux 2.6.32, Linux 4.18.20 > >and FreeBSD 12.0 accept crafted "ICMPv6 Packet Too Big" packet and > >path MTU decreased to 1280. > > > > I suspect this often doesn't matter much in practice.

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-04 Thread fujiwara
> From: Mark Andrews > Or one can use TSIG with a well known key to get a cryptograph hash of the > response. Below is how > how the servers for the Alexa to 1 Million handle unexpected TSIG. It’s well > under a day to add > this to a recursive server that supports TSIG already. It’s a

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-04 Thread fujiwara
> From: 神明達哉 >>https://tools.ietf.org/html/draft-fujiwara-dnsop-fragment-attack-01 >> >> It summarized DNS cache poisoning attack using IP fragmentation >> and countermeasures. >> >> If the draft is interested, I will request timeslot at IETF 104. > > I've read the draft. I think it's

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-01 Thread Paul Vixie
Mark Andrews wrote on 2019-03-01 12:00: Or one can use TSIG with a well known key to get a cryptograph hash of the response. ... i prefer this approach. no matter how bad fragmentation was in V4 and no matter how much worse it is in V6, we must not lock ourselves into packets whose size

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-01 Thread 神明達哉
At Fri, 01 Mar 2019 21:14:48 +0900 (JST), fujiw...@jprs.co.jp wrote: > Dear DNSOP, > > I submitted draft-fujiwara-dnsop-fragment-attack-01. > >https://tools.ietf.org/html/draft-fujiwara-dnsop-fragment-attack-01 > > It summarized DNS cache poisoning attack using IP fragmentation > and

Re: [DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-01 Thread Mark Andrews
Or one can use TSIG with a well known key to get a cryptograph hash of the response. Below is how how the servers for the Alexa to 1 Million handle unexpected TSIG. It’s well under a day to add this to a recursive server that supports TSIG already. It’s a couple of minutes of configuration

[DNSOP] draft-fujiwara-dnsop-fragment-attack-01.txt

2019-03-01 Thread fujiwara
Dear DNSOP, I submitted draft-fujiwara-dnsop-fragment-attack-01. https://tools.ietf.org/html/draft-fujiwara-dnsop-fragment-attack-01 It summarized DNS cache poisoning attack using IP fragmentation and countermeasures. If the draft is interested, I will request timeslot at IETF 104. I think