Re: [mif] New revision of DNS server selection

Ted Lemon <Ted.Lemon@nominum.com> Thu, 11 November 2010 10:21 UTC

Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: mif@core3.amsl.com
Delivered-To: mif@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A96AA3A686B for <mif@core3.amsl.com>; Thu, 11 Nov 2010 02:21:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ey+eKialGPF4 for <mif@core3.amsl.com>; Thu, 11 Nov 2010 02:21:50 -0800 (PST)
Received: from exprod7og103.obsmtp.com (exprod7og103.obsmtp.com [64.18.2.159]) by core3.amsl.com (Postfix) with ESMTP id D9B683A68EA for <mif@ietf.org>; Thu, 11 Nov 2010 02:21:46 -0800 (PST)
Received: from source ([64.89.228.229]) (using TLSv1) by exprod7ob103.postini.com ([64.18.6.12]) with SMTP ID DSNKTNvD2K5uOsuenqA+SjH1Vf36HEB4p07D@postini.com; Thu, 11 Nov 2010 02:22:20 PST
Received: from webmail.nominum.com (exchange-10.nominum.com [64.89.228.57]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (Client CN "exchange-10.win.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 478551B92C1; Thu, 11 Nov 2010 02:22:16 -0800 (PST)
Received: from exchange-10.WIN.NOMINUM.COM ([64.89.228.57]) by exchange-10.WIN.NOMINUM.COM ([64.89.228.57]) with mapi; Thu, 11 Nov 2010 02:22:16 -0800
From: Ted Lemon <Ted.Lemon@nominum.com>
To: "<teemu.savolainen@nokia.com>" <teemu.savolainen@nokia.com>
Date: Thu, 11 Nov 2010 02:22:14 -0800
Thread-Topic: [mif] New revision of DNS server selection
Thread-Index: AcuBik+xglWVCvnATOiNDU9Rph4HnA==
Message-ID: <41FC18BB-A0E7-4895-98BE-0DB31F1A10C8@nominum.com>
References: <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D02AEE@NOK-EUMSG-01.mgdnok.nokia.com> <29F4CEED-DB30-4A4B-8CDF-AB43B576DE01@nominum.com> <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D02AF6@NOK-EUMSG-01.mgdnok.nokia.com> <5390F566-8150-450B-BD5A-C2636EABE128@nominum.com> <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D6EA16@NOK-EUMSG-01.mgdnok.nokia.com> <99962D6D-2626-4B66-B996-DE6FA05B9BF8@nominum.com> <4F099E7F-800E-4F5E-96E5-9BD7FBF23BF2@nishidaya.org> <B21EAB17-ADA5-40FF-AA14-24D636B795F3@nominum.com> <FAEB3290-FF11-499C-AB9B-C3919B95E47B@nishidaya.org> <842EACF2-ADE7-434E-8F64-A5F65AA9893C@nominum.com> <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D6EC7B@NOK-EUMSG-01.mgdnok.nokia.com>
In-Reply-To: <18034D4D7FE9AE48BF19AB1B0EF2729F5F05D6EC7B@NOK-EUMSG-01.mgdnok.nokia.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "mif@ietf.org" <mif@ietf.org>
Subject: Re: [mif] New revision of DNS server selection
X-BeenThere: mif@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multiple Interface Discussion List <mif.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mif>
List-Post: <mailto:mif@ietf.org>
List-Help: <mailto:mif-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mif>, <mailto:mif-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Nov 2010 10:21:52 -0000

On Nov 11, 2010, at 5:53 PM, <teemu.savolainen@nokia.com> wrote:
> But then elsewhere people say network knows always better:) I'm confused of IETF:)
> The user can fallback to use single interface. 

How would the user know to fall back to a single interface?

> 
>> the other where an attacker tricks the client into sending messages for
>> a particular subdomain through it, while leaving the rest of the DNS
>> service untouched.
> 
> The latest draft now recommends using DNSSEC to validate responses.

I argued earlier that using DNSSEC without this draft was a better solution than this draft.   I still think that's the case.   The problem with recommendations of this sort is that they aren't enforceable, and aren't likely to be followed.  If, in order to get the behavior you want, you *have* to sign the zone, then that's more likely to happen.   So while I agree that a *requirement* to use DNSSEC here, if followed, would solve the problem, I don't think that the suggestion in the spec is going to help very much.

> Of course attacker can still *route* packets (and cause user to go to external side of www.corporation.com instead of internal?-)

This wouldn't work, because presumably they have different IP addresses.   If they have the same IP address, there's no need to have split DNS.

> In some scenarios the uplinks are always trusted (BBF). Sometimes you can administratively limit which interfaces to trust.

You are talking about the situation where the ISP controls the device that's doing the protocol then, right?   Traditionally the way we've done stuff like this is to put it in a cablelabs encapsulation; that way the people who need it for boxes they control have a clear specification, but it's not implemented on devices to which that specification doesn't apply (e.g., my iPad).