On Wed, 14 Feb 2007, Ted Lemon wrote:

> On Feb 14, 2007, at 10:17 PM, Dean Anderson wrote:
> > Basically, many people have greatly misunderstood this document,
> 
> That people have misunderstood the document is your assertion, which  
> may or may not be true.   That people agree that using in-addr for  
> security is clearly true, as your quotations suggest.   However, your  
> primary assertion - that people have misunderstood the document in  
> the way that you assert - remains unproven.

It certainly has been proven, repeatedly over the last 7 years that this
draft has been on the table. They have two issues that don't belong, and
which they keep trying to put in:

1  in-addr should be required.

2  forward/reverse checking is a legitimate security test.

Over the course of 7 years, The authors first said these things bluntly
in draft-in-addr-required, with a title that said in-addr was required.
That was rejected by the Working Group.  Since then, they have
alternately said that they aren't making these claims, and then when
called to task--'here are the claims again in your document'--they say,
as recently, that they want to encourage this viewpoint.  Rather that
giving a rational, logical reason for their views, they have argued that
one is __entitled__ to act without a rational basis. That is,
irrationally.   Of course, the IETF should not encourage irrational 
behavior by allowing it to be implied to be rational.

My point that a number of people (that includes Ted Lemon in particular)
have misunderstood the the document was proven (in particular to Ted
Lemon) in 2005. Apparently you (Ted) have no memory of our last
conversation on this subject in 2005:  You agreed in 2005 that people
misunderstood the document as I had said in 2005:

You said then:
==================
Re: [dnsop] Tangible harm caused by in-addr-required draft
by Ted Lemon Fri, 1 Apr 2005 
"> Dean Anderson writes:
> Basically, this says its ok to use in-addr based security, and if they
> don't match, that's a "security concern".
>
> In other words, matching in-addr is required.

"This is a legitimate, specific criticism.   One that I haven't seen  
from you before on the mailing list.   I very much support fixing  
cases where the text can be misread in the way you suggest.   It  
would be disastrous if someone read the document the way you suggest,  
and I can see where someone could make that mistake, although it  
wasn't obvious to me until you pointed it out. [...]"
==================

You said 'This is a legitimate, specific criticism'.  I had been saying
that all along in 2005, but apparently you didn't understand that then,
as you apparently don't understand it now.  But I eventually did get the
point across to you in 2005. I hope to get it across again. If you need
more of the conversation to jog your memory, I'll be happy to give links
to the original messages.



But, maybe I've assumed to much. I'll try to make it more explicit:

The document _still_ seeks to make the in-addr map required, and _still_
seeks to describe in-addr mapping as useful for security purposes.  
Persons reading this document, especially those persons inexperienced
with the past history of these claims, will get the idea that these
practices are required, and that in-addr is useful for security
purposes.

I note this text from Section 4, 4th paragraph, 1st sentence:

  "All IP addresses in use within a block should have a reverse 
mapping."

This is the old in-addr-is-required claim.  If in-addr really is
required, why make them change the title and even the document name? 
This statement, in conjunction with the advocacy that missing reverse 
DNS is a legitimate security concern, implies that in-addr is required.


Take this example from Section 3.1, Second paragraph:

   Some applications use DNS lookups for security checks.  To ensure
   validity of claimed names, some applications will look up records in
   the reverse tree to get names, and then look up the resultant name to
   see if it maps back to the address originally known.  Failure to
   resolve matching names is interpreted as a potential security
   concern.

Most people would read this as an endorsement of the use of DNS for
security checks.  It implies there is some legitimacy to this practice.  
Further, it implies that operator has no choice. I know of no
applications which perform such a check without a configurable choice.  
The only example was TCP wrappers, which _can_be_ configured this way.  

Look at the last sentence: 

   "Failure to resolve matching names is interpreted as a potential
security concern".

Thats the same old thing as before.

How about the phrase "To ensure validity"?  How is validity ensured?  
If the first DNS query was faked [by a variety of methods, including
brute force or inline sniffing], how is it now the second one is
trustworthy? Obviously, it isn't, and just as obviously there is no 
validity or legitimacy to the claim.  Kevin Darcy had it right in 2001, 
this draft is no good.

This is the same notion of 'legitimate security concern' that
in-addr-required had in 2005, for which you then said was a legitimate
complaint about the draft.  The draft is __filled__ with this kind of
stuff.

This is a good point to note that the draft claims in Section 3.1:

   "Some anti-spam (anti junk email) systems use the reverse tree to
   verify the presence of a PTR record, or validate the PTR value points
   back to the same address as the system originating the mail.  Some
   mail servers have the ability to perform such checks at the time of
   negotiation, and to reject all mail from hosts that do not have
   matching reverse mappings for their hostnames.  These PTR checks
   sometimes include databases of well-known conventions for "generic
   naming" conventions (for example, PTR records for dynamically-
   assigned hostnames and IP addresses), and sometimes allow complicated
   rules for quarantining or filtering mail from unknown or suspect
   sources.  Even very large ISPs may reserve the right to refuse mail
   from hosts without a reverse mapping."

Note that the 'dialup' in the name (Robert Story's example, which you
noted was unreasonable) is a "generic naming" convention.  [I note that
not even the authors do this.**]

Note the last sentence:

  "Even very large ISPs may reserve the right to refuse mail from hosts
   without a reverse mapping."

Most people would read this as saying that large ISPs refuse mail from
hosts without a reverse mapping, which just isn't so.  [again, neither
of the authors' refuse mail based on missing reverse mapping.**]

A close parsing of the sentence, however, shows it to be entirely
meaningless: 'Even very large ISPs' _could_ reserve the right to do just
about anything--Indeed, any one can _reserve_ any right. Its the
exercise that may cause problems.  Such meaningless statements should be
removed, especially where they are very likely to be misread.  Have you
really read the draft to identify and remove such statements? [Btw, to
"critically read" a document, means you are supposed to search out
ambiguities in the document, identify for removal or rewording such
meaningless sentences that will be misparsed and misread;  Find things
that different people might take to mean different things;  To critique
the document.]

For the previous draft, I posted a list of such dubious claims, but
received no response justifying the claims. This new draft was posted
that contained basically the same dubious claims slightly reworded, but
with the same objected implications as before, on the assurance that
objections had been addressed.  Obviously, they keep trying to work in
the same two objectionable ideas. Those ideas don't belong in the
document.  

Just because the same dubious claims keep being resubmitted does not
mean this Working Group should just approve the draft. It could also
start refusing to consider new drafts from these authors. The authors 
obviously refuse to remove the objected notions.

I argued in 2003 that we shouldn't accept any more drafts on the
subject, but Ed Lewis stated then that there is an interest and a need
for a report on the current state of affairs. I can accept a report on
the current state of affairs, but I can't accept the two false premises
the authors keep trying to more or less sureptitiously work into the
document in various ways.

I think the onus is not on me to prove that each subsequent new document
contains similar statements as previously, but should be on the authors
to prove that it doesn't----that they actually removed objectionable
statements and claims. 


The reason I'm writing an alternate draft is that many people, myself
included, think there should be some statement about the current state
of affairs. My draft will omit the agenda of trying to legitimize
irrational reverse-mapping claims of zealots, and instead show why
commonly occuring irrational claims about reverse mapping are not
rational and should be discouraged.

                --Dean


** I took off the reverse mapping for cirrus, and did some testing:

[EMAIL PROTECTED] tmp]# dig mx senie.com 

; <<>> DiG 9.2.1 <<>> mx senie.com
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 56611
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;senie.com.                     IN      MX

;; ANSWER SECTION:
senie.com.              3600    IN      MX      5 mxb.amaranth.net.

;; Query time: 211 msec
;; SERVER: 130.105.11.3#53(130.105.11.3)
;; WHEN: Fri Feb 16 11:19:30 2007
;; MSG SIZE  rcvd: 59


telnet mxb.amaranth.net. 25
Trying 204.10.1.19...
Connected to mxb.amaranth.net..
Escape character is '^]'.
220 mxb.amaranth.net ESMTP (44a2b828e188d015a20a7f64ac843dc6)
helo av8.net
250 mxb.amaranth.net
mail from: <[EMAIL PROTECTED]>
250 Ok
rcpt to: <[EMAIL PROTECTED]>
250 Ok
data
354 End data with <CR><LF>.<CR><LF>
Hi Dan. Just testing.

  --Dean
.
250 Ok: queued as 24D2B53F3


dig mx ca.afilias.info

; <<>> DiG 9.2.1 <<>> mx ca.afilias.info
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23227
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;ca.afilias.info.               IN      MX

;; ANSWER SECTION:
ca.afilias.info.        300     IN      MX      20 
antispam2.afilias.info.
ca.afilias.info.        300     IN      MX      10 
antispam.afilias.info.

;; Query time: 100 msec
;; SERVER: 198.3.136.10#53(198.3.136.10)
;; WHEN: Fri Feb 16 11:21:31 2007
;; MSG SIZE  rcvd: 84

[EMAIL PROTECTED] tmp]# telnet antispam.afilias.info 25
Trying 207.219.45.36...
Connected to antispam.afilias.info.
Escape character is '^]'.
220 antispam.ca.afilias.info ESMTP (89f05a796082cd6312c69e8fa318f08f)
helo av8.net
250 antispam.ca.afilias.info
mail from: <[EMAIL PROTECTED]>
250 Ok
rcpt to: <[EMAIL PROTECTED]>
250 Ok
data
354 End data with <CR><LF>.<CR><LF>
Hi Andrew. Just testing.

  --Dean
.
250 Ok: queued as DCC3285DD
quit
221 Bye
Connection closed by foreign host.


[EMAIL PROTECTED] tmp]# dig cirrus.av8.net

; <<>> DiG 9.2.1 <<>> cirrus.av8.net
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 36728
;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;cirrus.av8.net.                        IN      A

;; ANSWER SECTION:
cirrus.av8.net.         3600    IN      A       130.105.36.66

;; Query time: 8 msec
;; SERVER: 198.3.136.10#53(198.3.136.10)
;; WHEN: Fri Feb 16 11:24:30 2007
;; MSG SIZE  rcvd: 48

[EMAIL PROTECTED] tmp]# dig -x 130.105.36.66

; <<>> DiG 9.2.1 <<>> -x 130.105.36.66
;; global options:  printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46245
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0

;; QUESTION SECTION:
;66.36.105.130.in-addr.arpa.    IN      PTR

;; Query time: 9 msec
;; SERVER: 198.3.136.10#53(198.3.136.10)
;; WHEN: Fri Feb 16 11:24:42 2007
;; MSG SIZE  rcvd: 44




-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   






_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to