Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-bortzmeyer-dnsop-nxdomain-cut-00.txt]
"Paul Hoffman" <paul.hoffman@vpnc.org> Thu, 12 November 2015 17:54 UTC
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B7DB1B2B7C for <dnsop@ietfa.amsl.com>; Thu, 12 Nov 2015 09:54:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.347
X-Spam-Level:
X-Spam-Status: No, score=-1.347 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_COM=0.553] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GQGrlsM2YdCb for <dnsop@ietfa.amsl.com>; Thu, 12 Nov 2015 09:54:40 -0800 (PST)
Received: from hoffman.proper.com (Opus1.Proper.COM [207.182.41.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C8CE1B2B7A for <dnsop@ietf.org>; Thu, 12 Nov 2015 09:54:40 -0800 (PST)
Received: from [10.32.60.103] (50-1-98-110.dsl.dynamic.fusionbroadband.com [50.1.98.110]) (authenticated bits=0) by hoffman.proper.com (8.15.2/8.14.9) with ESMTPSA id tACHsccT046026 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 12 Nov 2015 10:54:39 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: hoffman.proper.com: Host 50-1-98-110.dsl.dynamic.fusionbroadband.com [50.1.98.110] claimed to be [10.32.60.103]
From: Paul Hoffman <paul.hoffman@vpnc.org>
To: Stephane Bortzmeyer <bortzmeyer@nic.fr>
Date: Thu, 12 Nov 2015 09:54:42 -0800
Message-ID: <75FCA3C3-A9F3-4C85-BB45-27DD927210E1@vpnc.org>
In-Reply-To: <20151112081514.GA16017@laperouse.bortzmeyer.org>
References: <20151106082238.GA2307@nic.fr> <A62EC834-C954-446C-9F7A-AB6D1F955C7F@verisign.com> <20151112081514.GA16017@laperouse.bortzmeyer.org>
MIME-Version: 1.0
Content-Type: text/plain; format="flowed"
X-Mailer: MailMate (1.9.2r5141)
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/aE-MQSc1o5eQqtK9HuQ5qSyhGDE>
Cc: "dnsop@ietf.org" <dnsop@ietf.org>, "Wessels, Duane" <dwessels@verisign.com>
Subject: Re: [DNSOP] [internet-drafts@ietf.org: I-D Action: draft-bortzmeyer-dnsop-nxdomain-cut-00.txt]
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Nov 2015 17:54:41 -0000
On 12 Nov 2015, at 0:15, Stephane Bortzmeyer wrote: > On Wed, Nov 11, 2015 at 01:15:37AM +0000, > Wessels, Duane <dwessels@verisign.com> wrote > a message of 107 lines which said: > >> This updates RFC 2308 (Negative Caching of DNS Queries). > > Good point, I'll add that. Also, I did not dare to add "Updates: RFC > 1034". Should I? Yes. >> I think the WG needs to discuss and agree whether or not to make the >> NXDOMAIN cut based on QNAME only, or on the SOA owner name. > > This is discussed (shortly) in section 5 of the draft. Apparently, it > can be risky to rely on the SOA. More discussion welcome. ...and is needed. >> If the goal is to thwart random qname attacks, then it would be >> better to use the SOA > > Sure, if you don't have access to the resolver (if you do, you can > "poison" it with a request QNAME=apex-of-the-attack). > >> Implementing NXDOMAIN cut should also reduce the effectiveness of a >> Kaminsky attack since the attack relies on the cache to forward >> numerous non-existent names. > > Right. > >> I think its a little dangerous to say that an NXDOMAIN response >> SHOULD cause a cache to delete already cached "positive" data. > > Could you elaborate why is it dangerous? (See also the second > paragraph of section 7.) If the NXDOMAIN response is not signed, it allows an attacker to block resolution of a name that was good, yes? --Paul Hoffman
- [DNSOP] [internet-drafts@ietf.org: I-D Action: dr… Stephane Bortzmeyer
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Wessels, Duane
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Mark Andrews
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Mark Andrews
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Stephane Bortzmeyer
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Paul Hoffman
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Wessels, Duane
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Mark Andrews
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Stephane Bortzmeyer
- [DNSOP] Using the SOA in a NXDOMAIN response (Was… Stephane Bortzmeyer
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Stephane Bortzmeyer
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Stephane Bortzmeyer
- Re: [DNSOP] Using the SOA in a NXDOMAIN response … John Levine
- Re: [DNSOP] Using the SOA in a NXDOMAIN response … Wessels, Duane
- Re: [DNSOP] [internet-drafts@ietf.org: I-D Action… Tony Finch