Re: [DNSOP] Mitigation of name collisions

"Paul Hoffman" <paul.hoffman@vpnc.org> Mon, 19 September 2016 02:01 UTC

Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 456F112B0B5 for <dnsop@ietfa.amsl.com>; Sun, 18 Sep 2016 19:01:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lc_2o4qeiHTZ for <dnsop@ietfa.amsl.com>; Sun, 18 Sep 2016 19:01:04 -0700 (PDT)
Received: from mail.proper.com (Opus1.Proper.COM [207.182.41.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A3BC12B0AE for <dnsop@ietf.org>; Sun, 18 Sep 2016 19:01:03 -0700 (PDT)
Received: from [10.32.60.34] (50-1-99-230.dsl.dynamic.fusionbroadband.com [50.1.99.230]) (authenticated bits=0) by mail.proper.com (8.15.2/8.14.9) with ESMTPSA id u8J210io054378 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sun, 18 Sep 2016 19:01:01 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: mail.proper.com: Host 50-1-99-230.dsl.dynamic.fusionbroadband.com [50.1.99.230] claimed to be [10.32.60.34]
From: Paul Hoffman <paul.hoffman@vpnc.org>
To: John R Levine <johnl@taugh.com>
Date: Sun, 18 Sep 2016 19:01:00 -0700
Message-ID: <D971E304-F572-4B90-9210-3C887F870E35@vpnc.org>
In-Reply-To: <alpine.OSX.2.11.1609181816130.6589@ary.lan>
References: <90CF5269-0443-45AB-83BA-BE9F9D03831A@vpnc.org> <alpine.OSX.2.11.1609181816130.6589@ary.lan>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"; markup="markdown"
X-Mailer: MailMate (1.9.5r5263)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/PPEXjCNrCBI7n5cdNVek4XYPCJ0>
Cc: dnsop@ietf.org
Subject: Re: [DNSOP] Mitigation of name collisions
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Sep 2016 02:01:06 -0000

On 18 Sep 2016, at 15:21, John R Levine wrote:

>> It is impossible to measure the effectiveness without knowing how 
>> many collision queries are just noise (queries that will cause no 
>> noticeable damage if they started coming back with results).
>
> Agreed.  I don't see how to find that out in ways that are not hard to 
> back out if it turns out the damage is as bad as we fear.

I do see that, but that's a discussion for a different time and place. 
(Unless this WG re-adopts corp/home/mail, of course.)

>
>> In the case of mitigation through wildcard-to-localhost, it is safe 
>> to assume that many organizations did in fact mitigate; we simply 
>> can't tell how many or when.
>
> How come?

Because a few of them told me they did.

> I'm not denying it's possible, but I've never seen any evidence that 
> there were collisions to mitigate.

You of all people should know that "people do dumb things with the DNS". 
:-)

> Before the 127.0.53.53 approach, some TLDs tried reserving the names 
> that showed up in DITL snapshots, and those names looked to me totally 
> random, likely generated by something that was trying to see whether 
> some piece of namespace was wildcarded.

As we saw at the collisions workshop 
(https://www.ietf.org/id/draft-thomas-namecollisions-workshop-report-05.txt), 
DITL data is poorly suited for following collisions because you can't 
tell how much is coming from organizational resolvers that are in front 
of a poorly-chosen name and how many are from upstream ISPs.

>> (Disclaimer: I'm now on ICANN staff, but well before I was, I wrote 
>> "Guide to Name Collision Identification and Mitigation for IT 
>> Professionals" for ICANN.)
>
> A fine document for people who already realize they need to deal with 
> collisions, not so much for people who don't realize they exist or 
> assume they're someone else's problem.

Correct. It has been helpful, though, at least to organizations seeing 
127.0.53.53.

--Paul Hoffman