[dnsext] Updating Security Considerations in RFC 6762
Loganaden Velvindron <loganaden@gmail.com> Tue, 07 April 2015 05:25 UTC
Return-Path: <loganaden@gmail.com>
X-Original-To: dnsext@ietfa.amsl.com
Delivered-To: dnsext@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF4841B2A16 for <dnsext@ietfa.amsl.com>; Mon, 6 Apr 2015 22:25:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AJ7sJoN5Fklu for <dnsext@ietfa.amsl.com>; Mon, 6 Apr 2015 22:25:15 -0700 (PDT)
Received: from mail-ie0-x233.google.com (mail-ie0-x233.google.com [IPv6:2607:f8b0:4001:c03::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FA4C1B2A14 for <dnsext@ietf.org>; Mon, 6 Apr 2015 22:25:15 -0700 (PDT)
Received: by iebmp1 with SMTP id mp1so38054014ieb.0 for <dnsext@ietf.org>; Mon, 06 Apr 2015 22:25:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=F2pgpoXWM2u1NZVX57i1lF33tzXxMuJ1gUHjjCcw/vs=; b=Y9fiIsGJ7912jGVuA5oBrp1DW8fzrJbn4Bgkpts5BEpEjKxZZp2ZL+uQunEmBn2g5D r8MSpHfbR52yCJwaDmOEyoxf2xj1HCCC2LgCdoBvEWtaVOk+8DRBdwZ9yZa0gYms0w+k A71ycCXCYfyLky1TQJ64zJyaAkBVLBycgCv+hr8OV9eHKBtkLYzCndTNIjE2o7kgMTBo OccWSJG9/M8yryFvZmwDFCgx4kI5phn4suDakK4OBWLXAdk0vbyxmJOmO3+YCyjA/Nuh dTFJp915RrRvj2PP+iC24qATdT1q3WwU0o+hP9Lj6vfGp0psZlnPDgd/y+NzQ6TCJR5F 76VQ==
MIME-Version: 1.0
X-Received: by 10.107.16.32 with SMTP id y32mr22966339ioi.53.1428384315059; Mon, 06 Apr 2015 22:25:15 -0700 (PDT)
Received: by 10.50.25.231 with HTTP; Mon, 6 Apr 2015 22:25:15 -0700 (PDT)
Date: Tue, 07 Apr 2015 05:25:15 +0000
Message-ID: <CAOp4FwS6LkuqOpUNFzzbLZS7X5=xKt_HTwcMWvQWR2ovUn8ftQ@mail.gmail.com>
From: Loganaden Velvindron <loganaden@gmail.com>
To: dnsext@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsext/R3h8AZRZcgWzVc1b_FRpNBgnK2M>
Subject: [dnsext] Updating Security Considerations in RFC 6762
X-BeenThere: dnsext@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DNS Extensions working group discussion list <dnsext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsext>, <mailto:dnsext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsext/>
List-Post: <mailto:dnsext@ietf.org>
List-Help: <mailto:dnsext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsext>, <mailto:dnsext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2015 05:25:17 -0000
Dear All, Following the release of a security vulnerability by CERT: https://www.kb.cert.org/vuls/id/550620 It might be worth considering updating RFC 6762 to advise implementors against amplification attacks by rate-limiting responses or refusing to reply to queries from outside local link. Quote: "Impact An mDNS response to a unicast query originating outside of the local link network may result in information disclosure, such as disclosing the device type/model that responds to the request or the operating system running such software. The mDNS response may also be used to amplify denial of service attacks against other networks." Feedback welcomed. //Logan C-x-C-c -- This message is strictly personal and the opinions expressed do not represent those of my employers, either past or present.
- [dnsext] Updating Security Considerations in RFC … Loganaden Velvindron