Haya Shulman wrote: > > On Sat, Oct 19, 2013 at 9:21 PM, Paul Vixie <p...@redbarn.org > <mailto:p...@redbarn.org>> wrote: > > by this, do you mean that you have found a fragmentation based > attack that works against DNSSEC? > > [...]
i interpreted your answer to my question as "no", since every counter-example you cited was a case where dnssec was used improperly. > by this, do you mean that if DNSSEC is widely deployed, your other > recommendations are unnecessary? > > > [...] i interpreted your answer to my question as "no", since every counter-example you cited was a case where dnssec was used improperly. most importantly, the lack of signed delegations and signed glue is by design, and is not a weakness in dnssec, since the only remaining vulnerability is denial of service, of which there are many other (and easier) methods. > > > in 2008, we undertook the short term (five years now) > countermeasure of source port randomization, in order to give us > time to deploy DNSSEC. if five years made no difference, and if > more short term countermeasures are required, then will another > five years be enough? perhaps ten years? exactly how long is a > "short term" expected to be? > > for more information, see: > > > http://www.circleid.com/posts/20130913_on_the_time_value_of_security_features_in_dns/ > > > Thanks, you summarised this very nicely. I'd like to bring it to your > attention that, in contrast to other sections, you did not cite our > work explicitly, in a section where you describe our fragmentation > based attacks (please add it). i'd have to read your published work before i could cite it. can you tell me where to find it online, outside any paywall or other restrictions? note that i'll be happy to respond, with citations, since your work is so topical. > ... I believe that five years is not a significant time frame in terms > of the future of the Internet. So, IMHO it may be the case that > further countermeasures may be required. i believe that if we can't make a significant difference in the resiliency and quality of core internet infrastructure after 16 years, then we wasted our time. and i know that if five more years wasn't enough, then fifty years would also not be enough. as an industry we must at some point either declare victory and stop creating lower quality counter-measures which add complexity, or we must declare failure and stop expecting dnssec to help with any problems we might discover in the existing system. we can't realistically or credibly have it both ways. > BTW, port randomisation prevents a number of attacks (not only cache > poisoning) and so is useful even when DNSSEC is fully deployed and > validated. i'd like to hear more about this. at the moment i have no picture in my head of "not only cache poisoning" when i think of the prevention offered by source port randomization. vixie
_______________________________________________ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listinfo/dns-operations dns-jobs mailing list https://lists.dns-oarc.net/mailman/listinfo/dns-jobs