Re: [secdir] secdir review of draft-ietf-dnsop-reflectors-are-evil-04.txt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> 
> 
> On Tuesday, September 25, 2007 09:36:23 AM +1000 Mark Andrews 
> <Mark_Andrews@xxxxxxx> wrote:
> 
> >> The Introduction seems a bit defensive in stating that the DOS attacks
> >> are not due to any flaw in the design of DNS or its implementations.
> >> While the blame for the attacks lies with the attackers, some aspects
> >> of nameserver configuration, behavior, and even protocol design make
> >> the systems vulnerable to these attacks. I suggest that the defensive
> >> language be removed.
> >
> > 	No, the blame lies with the parties not implementing BCP 38.
> > 	A rogue end site should not be able to inject spoofed packets.
> 
> No; the blame for an attack _always_ lies with the attacker, not the 
> victim.

	I'm not blaming the victim,  I'm pointing out the contributory
	negligence on behalf of the ISP that is supplying the
	attacker bandwidth.

	BCP 38 is over 7 years old now.  The time has past where you can
	blame the hardware vendors for lack of support.  The blame
	now has to be squarely brought down on the ISP's that have failed
	to deploy BCP 38.
	
	A attacker should not be able to send spoofed packet and have
	them reach the destination.  I don't care if the destination
	is the other side of the world or the neighbor.

	ISP's should be doing this anyway to protect their customers
	from accidental traffic.  e.g. DHCP lease changes where not
	all of the sockets with the old address have shutdown.  RFC
	1918 sourced traffic.

>  While I certainly wish more network providers would implement BCP 
> 38, those who fail to do so are not to blame for the bad acts of others.
>
> FWIW, I believe the "defensive language" in question is neither necessary 
> nor particularly problematic, so I take no position on whether it should be 
> removed.
>
> >> Finally, I wonder whether other more fundamental techniques for
> >> addressing the problem have been explored. For instance, if DNS clients
> >> were required to perform a simple handshake before a DNS server sent
> >> a long response, fake requests would provide little amplification.
> >> For example, requests that elicit long responses could prompt a
> >> shift to TCP.
> >
> > 	The DNS already does this.  The DNS is optimised so that the
> > 	normal responses go via UDP and the exceptional responses via
> > 	TCP.
> 
> It does, but normally only responses which are too long for UDP require the 
> use of TCP.  A recursive nameserver could mitigate this type of attack by 
> lowering the maximum response size it is willing to send via UDP, forcing 
> the use of TCP and thus a three-way handshake for larger responses.  The 
> tricky part is that setting the threshold too low can have serious 
> performance impact.
> 
> 
> 
> _______________________________________________
> Ietf mailing list
> Ietf@xxxxxxxx
> https://www1.ietf.org/mailman/listinfo/ietf
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews@xxxxxxx

_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]