>>>>> On Fri, 19 Jan 2007 01:10:46 +0900, >>>>> JINMEI Tatuya <[EMAIL PROTECTED]> said:
>> Dean Anderson argued that a proposed text change he offered be >> included instead of some language that is already in >> draft-ietf-dnsop-reverse-mapping-considerations-01.txt. His argument >> is that his proposed text "is clear and specific, and it resolves the >> ambiguity in your descriptions." >> I would like to defer to the group on this question. I am not so far >> convinced that Dean's formulation is clearer, more specific, or less >> ambiguous than the language that is in the draft at present, but I >> would like to hear an argument from anyone other than Dean who thinks >> it is. If no such argument is forthcoming, then I plan to leave >> alone the language in the draft about the implications of relying on >> the reverse tree for security. > It's difficult to answer the question with yes-or-no since the > previous discussion seems to diverge, covering many subtle points, but > I'm afraid I share with some of the concerns raised in the > discussion. I've carefully reread every line of the 01 version, and > found that my concerns are not really addressed (of course, I'm not > claiming it must necessarily be addressed). > Right now, I don't have time to provide further details in an e-mail > message, but I'll post my own comments to the 01 version by early next > week, which will probably be related to this issue. So, here are my own comments. Sorry, this is pretty lengthy...I hope I'm at least clear enough. Overall, I cannot be sure what exactly are recommended and why they are in Section 4. In particular, I don't understand the logic towards the following recommendation in Section 4.1 (3rd paragraph): All IP addresses in use within a block should have a reverse mapping. Perhaps the rationale behind it is an observation that there may be some useful cases where a reverse mapping helps or is necessary. But most of the concrete examples given in the draft do not lead to such a strong recommendation: - for "protocols that could benefit from accurate reverse mapping data" (quoted from Section 1.3), specifically [RFC4025]/[RFC4255]/[RFC4322], it should be sufficient to provide reverse mappings for those hosts that are involved in the protocols; we don't need a reverse mapping for other types of hosts, i.e., a host that is not an IPsec security gateway or an SSH server or an IKE responder. Actually, it seems to me the situation is the same as that of forward mapping - we usually need a forward mapping for hosts that provide some well-known services and are expected to be connected from other nodes, and we don't need to provide a forward mapping for other hosts (we may provide it, of course). - the situation is also the same for traceroute (section 3.1, last paragraph). It might be useful to know the "host name" of intermediate routers (which often provides some intutive information - which may not be very trustworthy though - of the network topology), but I think we don't usually rely on the reverse mapping result for numerous end devices, especially those that do not provide any well-known services. BTW, while the draft states when a reverse mapping is missing "the traceroutes take longer", I don't think this is very accurate. As long as the corresponding reverse mapping zone is properly maintained (*somewhere* under in-addr.arpa or ip6.arpa), traceroute should work fast enough without host name information. Of course, a lame-delegation type of "missing" may make it take longer, but I don't think this sentence specially talks about that case. Or perhaps it refers to delays due to a slow link such as dialup in conjunction with lack of negative caching (Section 3.1, 3rd paragraph of page 4)? If so, I don't think it's really a fair argument: first, such a delay or increased server load also happens for existing reverse mappings especially for some initial queries. Second, I believe negative caching is already pretty mature in caching server implementations (standardization-wise, RFC2308 defined the usage almost 9 years ago, which is 4 years before RFC3363 finally recommended ip6.arpa + nibbles for IPv6 reverse mapping); if we discuss effects such as delay or load by assuming lack of such a matured feature, we could also argue that trying to resolve reverse mappings can cause a delay or increased server load in conjuction of lack of caching (either positive or negative), whether the mapping exists or not. - I believe the same argument applies to the "delayed response" part of log analysis (section 3.1, second to last paragraph). I'm not sure how substantial a missing reverse map is for statistics packages that try to resolve it, but I suspect they will simply work with textual addresses in such a case. So, it seems to me that the only essential background that results in the "strong recommendation" is "FTP (or telnet) sites simply rejecting user sessions without a reverse mapping", "web sites verifying the client's location using reverse mapping", or "TCP wrappers rejecting clients that don't have reverse mapping", or "anti-spam systems performing reverse-forward match tests to reject mail that does not pass the test", etc. That is, it seems the primary motivation of the recommendation is, perhaps implicitly, to endorse such "security" usage of reverse mappings. If that were the real intent (I don't think so based on the discussion in this thread so far), I'd be confused because in section 4.3 this same document actually (at least to some extent) discourages such usage: "The use of reverse mapping does not usually improve security, and should not be a default policy." I guess this confusion I'm feeling is related to the issues raised in the "ambiguity" thread. One expected explanation is that "some administrators don't accept the recommendations (in this case "do not rely on reverse mappings for security purposes that do not actually improve security") anyway, so it's more realistic to consider how to deal with them (in this case providing reverse mappings for all IP addresses "in use"). Admittedly, there are such administrators. But if our action is to let such admins do what doesn't really make sense and to recommend others to adapt themselves for the convenience of the stubborn admins, I don't see much importance in this effort; a stubborn admin will do whatever they want anyway regardless of "technically sound" recommendations from the IETF, whether it's not relying on reverse mappings for non-secure purposes or it's providing reverse mappings for all IP addresses. I thought the IETF should primarily make recommendations based on what is technically sound, and then (if still necessary) consider compromises to deal with evil things. Based on this opinion, my general proposal for section 4 is: - recommend that RIR or LIR (or any organization that delegates IP address blocks) should provide appropriate reverse mapping delegations as well so that users who are delegated the address blocks can provide any reverse mappings that they want to publicize. - not recommend "all IP addresses in use within a block have a reverse mapping." In addition, we might clarify it's up to the site administrator which part of the their addresses should have reverse mappings. - a bit more strongly discourage relying on the use of reverse mappings for "security" purposes that do not really improve security, clarifying those include reverse-forward matching or rejecting FTP/telnet/SMTP requests based on the (non)existence of reverse mapping or failure in reverse-forward match. - and then (if still necessary) note that some administrators will still ignore the recommendations and continue relying on reverse mappings for the "security" purposes, and that other site administrators may want to provide more reverse mappings as an intermediate solution to deal with such "security-conscious" admins. I also have related comments on other sections, but I'm stopping here at the moment since I guess it's already pretty controversial. If we cannot agree on these fundamental points, the other comments on other sections will probably meaningless. Thanks, JINMEI, Tatuya Communication Platform Lab. Corporate R&D Center, Toshiba Corp. [EMAIL PROTECTED] p.s. it's undoubtedly too early, but I'm copying below what I'd envision in section 4 based on my opinions described above, just to be concrete along with the actual text. 4. Recommendations 4.1 Delegation considerations It is desirable that Regional Registries and any Local Registries to whom they delegate should ensure the delegation of corresponding reverse mappings to the delegated organizations. Network operators should define and implement policies and procedures which delegate reverse mappings to their clients who wish to run their own reverse tree DNS services. By the same token, network operators should provide reverse mapping for those users who do not have the resources to do it themselves. 4.2 Application considerations Applications should not rely on reverse mapping for proper operation, although functions that depend on reverse mapping (such as [RFC4025]) will obviously not work in its absence. When the use of reverse mapping is optional for an application, the default configuration should be to turn it off. Operators and users are reminded that the use of the reverse tree, sometimes in conjunction with a lookup of the name resulting from the PTR record, provides no real security, can lead to erroneous results and generally just increases load on DNS servers. Further, in cases where address block holders fail to properly configure reverse mapping, users of those blocks are penalized. 4.3 Usage and deployment considerations Site administrators are encouraged to think carefully before adopting any test of reverse delegation, and are generally discouraged to employ such a test, particularly when that test is intended to improve security. The use of reverse mapping does not usually improve security, and should not be a default policy. Those improper applications of reverse mapping include rejecting connection attempts due to lack of reverse mapping or mismatch of reverse and forward mappings. This test not only fails to reject many attempts of invalid access, but also rejects legitimate request from innocent users. For example, some users continue to report difficulty in ensuring correct management of the reverse tree by upstream providers, in which case the users cannot provide the required reverse mapping even if they want to do so. Also, adding a very large number of PTR records for a given reverse mapping can make providing reverse mappings ineffective; in particular, sites where a very large number of "virtual" host names resolve to the same host may force DNS responses to use TCP. Thus, complete connection rejection on the basis of missing reverse mapping should be regarded as a last resort. In general, site administrators have the right to decide whether or not they provide reverse mappings for addresses they are using, and in case they do, the right to decide for which part of the addresses they provide the mappings. However, the administrators are cautioned that administrators at other sites sometimes use reverse mapping as one of several pieces of evidence in evaluating connection traffic, particularly in the context of mail systems and anti-spam efforts. Even though such us of reverse mapping should usually be discouraged especially when it results in rejecting connection attempts, administrators who believe in this type of "security" will continue relying on it for the moment. Thus, until the day the improper reliance of reverse mapping is fully obsoleted, an administrator who owns an IP address block may need to consider providing more reverse mappings than those that are really necessary. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www1.ietf.org/mailman/listinfo/dnsop