Re: [DNSOP] [dns-operations] dnsop-any-notimp violates the DNS standards

Michael Sinatra <michael@brokendns.net> Tue, 17 March 2015 01:16 UTC

Return-Path: <michael@brokendns.net>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C676D1ACDAC for <dnsop@ietfa.amsl.com>; Mon, 16 Mar 2015 18:16:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.31
X-Spam-Level:
X-Spam-Status: No, score=-1.31 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, J_CHICKENPOX_45=0.6, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1GxilnMp4dPY for <dnsop@ietfa.amsl.com>; Mon, 16 Mar 2015 18:16:38 -0700 (PDT)
Received: from elwha.brokendns.net (elwha.brokendns.net [IPv6:2607:f2f8:a544::2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0C0181ACDAD for <dnsop@ietf.org>; Mon, 16 Mar 2015 18:16:38 -0700 (PDT)
Received: from sponge.burnttofu.net (unknown [IPv6:2601:9:4400:5500::2222]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elwha.brokendns.net (5.65c/IDA-1.4.4/5.63) with ESMTPSA id 8BE7814490; Mon, 16 Mar 2015 18:16:37 -0700 (PDT)
Message-ID: <55078075.8060803@brokendns.net>
Date: Mon, 16 Mar 2015 18:16:37 -0700
From: Michael Sinatra <michael@brokendns.net>
User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0
MIME-Version: 1.0
To: Yunhong Gu <guu@google.com>
References: <20150309110803.4516.qmail@cr.yp.to> <20150309151812.GA14897@xs.powerdns.com> <20150316142350.GB26918@xs.powerdns.com> <55075C41.9000208@brokendns.net> <13D58CB4-95BD-412B-A073-C95617E97BCE@redbarn.org> <55077A64.7050906@brokendns.net> <CAGmQtQK1fa2Ji0gUzahZ4q4yJKTy9fwdRKDE+Vhe6h3ejBm=KA@mail.gmail.com>
In-Reply-To: <CAGmQtQK1fa2Ji0gUzahZ4q4yJKTy9fwdRKDE+Vhe6h3ejBm=KA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/mPBvtbXj_qiMi5nla-NIYCfQwGE>
Cc: dnsop@ietf.org, P Vixie <paul@redbarn.org>, bert hubert <bert.hubert@netherlabs.nl>, dns-operations <dns-operations@dns-oarc.net>
Subject: Re: [DNSOP] [dns-operations] dnsop-any-notimp violates the DNS standards
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Mar 2015 01:16:38 -0000


On 03/16/15 18:07, Yunhong Gu wrote:
> 
> 
> On Mon, Mar 16, 2015 at 8:50 PM, Michael Sinatra <michael@brokendns.net
> <mailto:michael@brokendns.net>> wrote:
> 
>     On 3/16/15 4:15 PM, P Vixie wrote:
>     >
>     >
>     > On March 17, 2015 7:42:09 AM GMT+09:00, Michael Sinatra <michael@brokendns.net <mailto:michael@brokendns.net>> wrote:
>     >>
>     >>
>     >> On 03/16/15 07:23, bert hubert wrote:
>     >>
>     >>> Separately, I fail to see why we actually need to outlaw ANY queries
>     >> when we
>     >>> can happily TC=1 them.
>     >>
>     >> If the public recursives also support TC=1 on all ANY queries, then
>     >> this
>     >> works.  If not, the issue arises where just-below-the-radar attacks are
>     >> using many public recursives, in which case you're not stopping much.
>     >
>     > Michael, what attacks do you think we can stop by limiting ANY? Paul
> 
>     The attack that I have had to grapple with is this:
> 
>     * Someone sets up a bot to query public recursives (google, opendns,
>     level3, etc.) for a particular domain whose ANY response is large.
>     (This _usually_ means DNSSEC-signed.)
> 
>     * The query from each <client,domain,qtype> tuple is just barely slow
>     enough not to trigger rate limiting from the public recursive service.
> 
>     * The backend of the public recursive service queries my authoritatives
>     for some of the involved domains.  Suppose the response is just under
>     the usual typical default EDNS0 buffer size of 4096.
> 
>     * These domains are DNSSEC-signed with NSEC3.  Many tools set the TTL of
>     NSEC3PARAM to 0 when signing zones with NSEC3.  The NSEC3PARAM RR is
>     part of the ANY response.
> 
> 
> Sounds to me this is the root cause of the problem and ANY is the just a
> scapegoat.

Giving NSEC3PARAM a positive TTL would prevent my headache, but it
wouldn't help the victim of the attack, and would probably make it worse
for the victim.

michael