RE: [dhcwg] Trust model of Client FQDN option

"Bernie Volz" <volz@cisco.com> Wed, 04 August 2004 00:55 UTC

Received: from megatron.ietf.org (megatron.ietf.org [132.151.6.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA27533; Tue, 3 Aug 2004 20:55:12 -0400 (EDT)
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1Bs9wX-0005vg-JJ; Tue, 03 Aug 2004 20:47:45 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1Bs9uS-0004xK-Tw for dhcwg@megatron.ietf.org; Tue, 03 Aug 2004 20:45:36 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA26679 for <dhcwg@ietf.org>; Tue, 3 Aug 2004 20:45:35 -0400 (EDT)
Received: from sj-iport-1-in.cisco.com ([171.71.176.70] helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1Bs9xb-000592-4W for dhcwg@ietf.org; Tue, 03 Aug 2004 20:48:54 -0400
Received: from sj-core-1.cisco.com (171.71.177.237) by sj-iport-1.cisco.com with ESMTP; 03 Aug 2004 17:46:38 -0700
X-BrightmailFiltered: true
Received: from flask.cisco.com (IDENT:mirapoint@flask.cisco.com [161.44.122.62]) by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id i740iubA021493; Tue, 3 Aug 2004 17:45:00 -0700 (PDT)
Received: from volzw2k (sjc-vpn3-608.cisco.com [10.21.66.96]) by flask.cisco.com (MOS 3.4.6-GR) with ESMTP id AKO96757; Tue, 3 Aug 2004 20:37:58 -0400 (EDT)
From: Bernie Volz <volz@cisco.com>
To: 'Ted Lemon' <mellon@fugue.com>, 'Pekka Savola' <pekkas@netcore.fi>
Subject: RE: [dhcwg] Trust model of Client FQDN option
Date: Tue, 03 Aug 2004 20:39:25 -0400
Organization: Cisco
Message-ID: <000b01c479bb$81780bf0$c3838182@amer.cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.5709
In-Reply-To: <21E7AC38-E59B-11D8-8860-000A95D9C74C@fugue.com>
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4939.300
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 52f7a77164458f8c7b36b66787c853da
Content-Transfer-Encoding: 7bit
Cc: dhcwg@ietf.org
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: dhcwg.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
Sender: dhcwg-bounces@ietf.org
Errors-To: dhcwg-bounces@ietf.org
Content-Transfer-Encoding: 7bit

Also, it is generally viewed as a bad idea to mix both static and dynamic
DNS resource records in a zone. So, if you want to completely avoid the
problem, keep the zones which contain the administrative DNS information
(www., ftp., pop3., ...) separate from the (dynamic) client information.

- Bernie

> -----Original Message-----
> From: dhcwg-bounces@ietf.org [mailto:dhcwg-bounces@ietf.org] 
> On Behalf Of Ted Lemon
> Sent: Tuesday, August 03, 2004 6:19 PM
> To: Pekka Savola
> Cc: dhcwg@ietf.org
> Subject: Re: [dhcwg] Trust model of Client FQDN option
> 
> 
> On Aug 3, 2004, at 11:03 AM, Pekka Savola wrote:
> > I'm not sure the v4 or v6 DHC FQDN client options address 
> the problem 
> > of the trust model for the update content sufficiently 
> well.  I'd even 
> > go as far to say that it might create a false sense of security.
> 
> Pekka, in the meeting this morning, you said you hadn't read 
> the drafts 
> having to do with DNS updates on DHCPv4.   Have you now read them?   
> The reason I ask is that for the entire duration of the time 
> I've been 
> coming to IETF, people have occasionally raised the very same 
> issue you 
> are now raising.
> 
> The solution we have adopted, which is widely deployed, allows two 
> answers to your question.   The first is a more paranoid 
> solution that 
> requires widespread distribution of individual DNS update keys.   The 
> second is a more laissez-faire solution that does not require the 
> distribution of individual DNS update keys.   This second solution is 
> no more or less secure than the first, but its behavior is 
> different.   
> Names added by the DHCP server are marked as such, and if a name is 
> present and was not added by the DHCP server, that name can't be 
> replaced at the request of the DHCP client.   When a client's lease 
> expires, another client can acquire the previous client's name, so 
> there's no protection for client names.   You get to pick which 
> solution to deploy, based on your willingness to distribute keys and 
> based on whether or not you care whether a DHCP client can count on 
> retaining its name, once its name is registered.
> 
> So this is a well-understood problem, with well-understood and widely 
> deployed solutions.   You can see an example implementation 
> in the ISC 
> DHCP client and server if you're curious, and as far as I know every 
> commercial DHCP server also implements this, and I know of 
> quite a few 
> sites that use it in practice.  Indeed, it's been deployed at IETF 
> meetings in the past (not sure if it's running this time).
> 
> 
> _______________________________________________
> dhcwg mailing list
> dhcwg@ietf.org
> https://www1.ietf.org/mailman/listinfo/dhcwg
> 


_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg