[dnsext] Updating Security Considerations in RFC 6762

Loganaden Velvindron <loganaden@gmail.com> Tue, 07 April 2015 05:25 UTC

Return-Path: <loganaden@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF4841B2A16 for <dnsext@ietfa.amsl.com>; Mon, 6 Apr 2015 22:25:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AJ7sJoN5Fklu for <dnsext@ietfa.amsl.com>; Mon, 6 Apr 2015 22:25:15 -0700 (PDT)
Received: from mail-ie0-x233.google.com (mail-ie0-x233.google.com [IPv6:2607:f8b0:4001:c03::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FA4C1B2A14 for <dnsext@ietf.org>; Mon, 6 Apr 2015 22:25:15 -0700 (PDT)
Received: by iebmp1 with SMTP id mp1so38054014ieb.0 for <dnsext@ietf.org>; Mon, 06 Apr 2015 22:25:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=F2pgpoXWM2u1NZVX57i1lF33tzXxMuJ1gUHjjCcw/vs=; b=Y9fiIsGJ7912jGVuA5oBrp1DW8fzrJbn4Bgkpts5BEpEjKxZZp2ZL+uQunEmBn2g5D r8MSpHfbR52yCJwaDmOEyoxf2xj1HCCC2LgCdoBvEWtaVOk+8DRBdwZ9yZa0gYms0w+k A71ycCXCYfyLky1TQJ64zJyaAkBVLBycgCv+hr8OV9eHKBtkLYzCndTNIjE2o7kgMTBo OccWSJG9/M8yryFvZmwDFCgx4kI5phn4suDakK4OBWLXAdk0vbyxmJOmO3+YCyjA/Nuh dTFJp915RrRvj2PP+iC24qATdT1q3WwU0o+hP9Lj6vfGp0psZlnPDgd/y+NzQ6TCJR5F 76VQ==
MIME-Version: 1.0
X-Received: by 10.107.16.32 with SMTP id y32mr22966339ioi.53.1428384315059; Mon, 06 Apr 2015 22:25:15 -0700 (PDT)
Received: by 10.50.25.231 with HTTP; Mon, 6 Apr 2015 22:25:15 -0700 (PDT)
Date: Tue, 07 Apr 2015 05:25:15 +0000
Message-ID: <CAOp4FwS6LkuqOpUNFzzbLZS7X5=xKt_HTwcMWvQWR2ovUn8ftQ@mail.gmail.com>
From: Loganaden Velvindron <loganaden@gmail.com>
To: dnsext@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsext/R3h8AZRZcgWzVc1b_FRpNBgnK2M>
Subject: [dnsext] Updating Security Considerations in RFC 6762
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext/>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2015 05:25:17 -0000

Dear All,

Following the release of a security vulnerability by CERT:

https://www.kb.cert.org/vuls/id/550620

It might be worth considering updating RFC 6762 to advise implementors
against amplification attacks by rate-limiting responses or refusing
to reply to queries from outside local link.

Quote:


"Impact

An mDNS response to a unicast query originating outside of the local
link network may result in information disclosure, such as disclosing
the device type/model that responds to the request or the operating
system running such software. The mDNS response may also be used to
amplify denial of service attacks against other networks."


Feedback welcomed.
//Logan
C-x-C-c







-- 
This message is strictly personal and the opinions expressed do not
represent those of my employers, either past or present.