Re: OFFTOPIC: DNSSEC groupthink versus improving DNS

David Conrad <drc@virtualized.org> Thu, 07 August 2008 20:18 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1EED23A6936; Thu, 7 Aug 2008 13:18:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.197
X-Spam-Level:
X-Spam-Status: No, score=-3.197 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1, SARE_LWSHORTT=1.24]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5MlGaHwsN-WJ; Thu, 7 Aug 2008 13:18:42 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 08A753A67B3; Thu, 7 Aug 2008 13:18:42 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KRBqO-0008Gi-DE for namedroppers-data@psg.com; Thu, 07 Aug 2008 20:12:20 +0000
Received: from [204.152.189.190] (helo=virtualized.org) by psg.com with esmtp (Exim 4.69 (FreeBSD)) (envelope-from <drc@virtualized.org>) id 1KRBqK-0008GE-NY for namedroppers@ops.ietf.org; Thu, 07 Aug 2008 20:12:18 +0000
Received: from [10.0.1.199] (c-71-198-3-247.hsd1.ca.comcast.net [71.198.3.247]) by virtualized.org (Postfix) with ESMTP id B4C0E2BE1E9; Thu, 7 Aug 2008 13:12:15 -0700 (PDT)
Cc: Namedroppers <namedroppers@ops.ietf.org>
Message-Id: <26DBE8D4-8C4A-4E4E-BF1C-7B2B951C9FD4@virtualized.org>
From: David Conrad <drc@virtualized.org>
To: bert hubert <bert.hubert@netherlabs.nl>
In-Reply-To: <20080807134236.GA19024@outpost.ds9a.nl>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v928.1)
Subject: Re: OFFTOPIC: DNSSEC groupthink versus improving DNS
Date: Thu, 07 Aug 2008 13:12:09 -0700
References: <489AD5E3.20708@nlnetlabs.nl> <20080807134236.GA19024@outpost.ds9a.nl>
X-Mailer: Apple Mail (2.928.1)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

Bert,

On Aug 7, 2008, at 6:42 AM, bert hubert wrote:
> On Thu, Aug 07, 2008 at 01:00:51PM +0200, Wouter Wijngaards wrote:
>> The best solution is of course DNSSEC. Crypto signatures instead of
>> randomisation games. Enable DNSSEC validation now.
> Not specifically aimed at you Wouter, but it appears the most vocal  
> people
> in the DNS world are starting to suffer from "groupthink".

If constructive discussion is desirable, I suspect it would probably  
be best to avoid labeling.

> The reason I rant on about this is that I care deeply about DNS, and  
> that
> DNS is *currently* under attack. While DNSSEC is agressively branded  
> as a
> fine solution, at best, it will be a solution in a few years.

This isn't quite accurate.  DNSSEC is an incrementally deployable  
solution.  It can fully protect zones that take the trouble to sign  
today if caching server operators take the trouble to configure trust  
anchors for those zones.  I have some skepticism DNSSEC will be a  
fully deployed solution in the foreseeable future, however that does  
not mean that there isn't potential benefit from its use.

And I say this as someone who hates DNSSEC with the passion of a  
thousands suns of passionate hate.

> Additionally, given things I've said before, I personally don't  
> think DNSSEC
> will ever see wide usage in the real world, so I feel very strongly  
> that not
> only do we need to improve DNS in the short term, the short term  
> solution
> also needs to be the long term solution.

The short term solutions proposed to date are protecting the data  
_channel_, not the actual data itself.  Fundamentally, this is a  
flawed approach because as long as the data in the response is  
vulnerable, there will be ways to abuse it.  Perfect source port/128  
bit XQID randomization, query/response TTL windowing, whatever is  
meaningless if you have write access to the path over which the query  
or response travels.  Those hacks are treating the symptom and are a  
holding action whereas DNSSEC, like aggressive chemotherapy, treats  
the disease.  One can reasonably argue that the side effects of  
treating the disease may be worse than the disease, but my view is  
that is simply a "small matter of programming" that will be addressed  
over time.

> But no matter what I feel - please everybody take a minute to read the
> symptoms of groupthink, and wonder if we are still doing the best  
> job we can
> to improve DNS in the real world.

I will admit that this feels sort of like someone from the petroleum  
industry accusing folks at the IPCC of "groupthink".

In the end, rants on either side don't actually matter all that much.   
There is a problem for which DNSSEC is proposed as a solution.  There  
are implementations that both do and do not support DNSSEC.  There are  
costs, benefits, and risks on which individual organizations will have  
to base their decisions to deploy DNSSEC or not. As such, I can't get  
too worked up on this topic -- I suspect the market will decide.

Regards,
-drc


--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>