I opposed this document in the DNSOP working group.  I have found some 
additional reasons to oppose this document, in addition to the reasons I 
gave to the DNSOP WG.  I generally agree with Stephen Hanna's findings.

I.   Harm only possible for ENDSO; Update RFC 2671 Instead
II.  Authority Servers not Addressed, but Present More Harm
III. Motivating Attacks Seem Contrived
IV.  Ordinary DDOS Mitigation Appropriate for Reflector Case
V.   Mitigation Options Limited in Authority Case
VI.  Using "Evil" in a RFC Title is Unprofessional
VII. Reflectors are Useful for Scientic Measurement
VIII.Conclusion: Insufficient Harm to Justify Action


I.   Harm only possible for ENDSO; Update RFC 2671 Instead

The maximum non-EDNS amplification factor is 8 (512 byte maximum
response / 64 byte minimum query)  The non-EDNS attack has been possble 
for over 20 years, but there have been no significant problems reported 
in that time.  There is no reason to think the non-EDNS case presents 
any problem, nor has that case ever presented a problem.

The significant harm posed by the attack described in this document is a 
result of EDNS extensions which allow DNS servers to respond with upto 
8K byte long response to a relatively short EDNSO query.

The EDNSO extension considered some security vulnerabilies created by 
the protocol extension. RFC 2671 states:

6 - Security Considerations

     Requestor-side specification of the maximum buffer size may open a
     new DNS denial of service attack if responders can be made to send
     messages which are too large for intermediate gateways to forward,
     thus leading to potential ICMP storms between gateways and
     responders.

Security vulnerability of DDOS is nothing new for EDNSO.  Therefore at 
most, this should be added as an addition to the security considerations 
section in an update to RFC 2671.

II.   Authority Servers not Addressed, but Present More Harm

This document ignores the implications of these facts:

1. Amplification does not require reflectors, but only requires servers
with sufficiently large packets and high bandwidth capabilities.

2. Authority servers are more difficult to block, since blocking
authority servers results in a outage of DNS service for the zones
served by that authority server.

III.  Motivating Attacks Seem Contrived

The motivating attacks also have a feature of being contrived examples.  
In the actual attacks reported, serious forensics would lead to the
identity of the attacker, making intelligent attackers avoid this
attack. In the example widely discussed, the attacker obtained root
access to a nameserver and hand-crafted an 8Kbyte ENDS record on the
server.  The attacker then uses a group of computers to send ENDS query
packets with false source address to 'reflector' nameservers, which sent
the 8kbyte response to the spoofed source address.

Even though forensics would probably be able to identify the intruder to
the original nameserver, in the motivating attack, the attack was not
serious enough to merit law enforcement to conduct forensic analysis.

There have been no further similar attacks.

IV.  Ordinary DDOS Mitigation Appropriate for Reflector Case

Mitigation includes blocking the reflector nameservers with no harm to
the target of the attack.  Mitigation can be done at any convenient
point on the path between the reflector and the target.  One motivating 
statement for the draft was that 'one cannot contact 20,000 server 
operators to ask them to block the packets'. But that is not a 
requirement for mitigation. Mitigation can be performed by ISPs in the 
path, as is currently done for other types of DDOS attacks.

Because the mitigation options are the same as with any other spoofed
DDOS attack, this attack does not merit special attention. And as the
document states, if one can't send spoofed packets, one cannot conduct
this attack at all.

V.   Mitigation Options Limited in Authority Case

By contrast with the open recursor case, one cannot easily mitigate an
identical attack using legitimate authority nameservers serving
legitimately large ENDS records.  Blocking all authority nameservers for
a given zone disrupts DNS service between the DDOS target and the zones
on the affected nameservers.  Examples of such servers include the Root
DNS servers.  Blocking the Root DNS servers is at least as bad if not
worse than the DDOS traffic.

This case is ignored.

VI.  Using "Evil" in a RFC Title is Unprofessional

The word "evil" in the name given to the draft and used in its title is
also unprofessional, and doesn't belong in IETF documents. A search of 
the RFC Index revealed no other similarly titled documents.

VII. Reflectors are Useful for Scientic Measurement

Last, the open recursor is a very useful scientific tool for analyzing
the internet, and is used in a number of scientific papers: "King:
Estimating Latency between Arbitrary Internet End Hosts"  by Gummadi,
Saroiu, and Gribble
(http://www.cs.washington.edu/~gribble/rw/papers/awards_assets/king.pdf)

The King method is cited in several scientific papers on Anycast:
"A Measurement-based Deployment Proposal for IP Anycast", Ballani, 
Francis, and Ratnasamy 
http://pias.gforge.cis.cornell.edu/pub/anymeasure-imc-camera-final.pdf

Because the NSID draft (RFC 5001) makes it impossible to independently
identify Anycast Root DNS server instances (because the returned nonce
is encrypted and only decryptable by the root operators) and therefore
impossible to measure the reliability of Anycast Root DNS services; the
open recursor method is the only economical method to measure anycast
services.  

VIII.Conclusion: Insufficient Harm to Justify Action

There is very little or no actual harm to having open DNS recursors, and
a great deal of benefit.  DNS server operators should not be discouraged 
from operating open recursors.

Dean Anderson
Av8 Internet, Inc


On Mon, 24 Sep 2007, Stephen Hanna wrote:

> I have reviewed this document as part of the security directorate's
> ongoing effort to review all IETF documents being processed by the
> IESG.  These comments were written primarily for the benefit of the
> security area directors.  Document editors and WG chairs should treat
> these comments just like any other last call comments.
> 
> DNS is not my area of expertise but the document clearly explains
> the nature of the problem to be solved (DOS attacks that employ
> DNS servers as amplifiers) and the recommendations for solving the
> problem (employing ingress filtering to prevent IP address spoofing
> and changing nameservers to provide recursive name lookup service
> only to the intended clients).
> 
> I have no issue with the main content of the document. It does seem
> like a worthwhile recommendation. However, I have a few comments.
> 
> The Introduction seems a bit defensive in stating that the DOS attacks
> are not due to any flaw in the design of DNS or its implementations.
> While the blame for the attacks lies with the attackers, some aspects
> of nameserver configuration, behavior, and even protocol design make
> the systems vulnerable to these attacks. I suggest that the defensive
> language be removed.
> 
> Although I agree that ingress filtering is a good solution to this
> problem and provides many other benefits since it addresses many
> different attacks that involve spoofed IP addresses, the document
> states repeatedly that ingress filtering is the only solution to
> the problem. Ingress filtering may be the best solution but it is
> NOT the only solution, as evidenced by the other measures described
> in the document. None of these measures (including increased use
> of ingress filtering) will provide complete and absolute protection
> against DOS attacks that use nameservers as attack amplifiers.
> Employing all of the measures as appropriate while emphasizing
> the huge benefits of ingress filtering seems like the best approach.
> So I suggest that the wording in the document be toned down to take
> a more balanced approach to the problem.
> 
> Finally, I wonder whether other more fundamental techniques for
> addressing the problem have been explored. For instance, if DNS clients
> were required to perform a simple handshake before a DNS server sent
> a long response, fake requests would provide little amplification.
> For example, requests that elicit long responses could prompt a
> shift to TCP. Of course, this would have other unpleasant side effects
> such as slowing down the processing of DNS requests with long responses
> and troubles getting DNS requests through firewalls. I'm not suggesting
> that this approach be discussed in this document, simply that it be
> considered (which probably has already been done).
> 
> Thanks,
> 
> Steve
> 
> _______________________________________________
> Ietf mailing list
> [EMAIL PROTECTED]
> https://www1.ietf.org/mailman/listinfo/ietf
> 
> 

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   



_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to