On Tue, 26 Aug 2008, Ted Lemon wrote:

> On Aug 26, 2008, at 1:06 PM, Dean Anderson wrote:
> > How could their testing and analysis be considered 'thorough' or
> > credible when they didn't find the very serious flaws just recently
> > identified on this list?
> 
> To summarize, the two "flaws" to which you refer are:

I'm not sure I agree with your summary of the NSEC/NSEC3 issues. I'll
mostly ignore your summary for now and just note that there are a number
of other serious flaws.

3. Ordinary cache poisoning still possible in DNSSEC-aware non-verifying
caches, resulting in a DOS.

4. Crypto-overload DOS attack on verifying caches.

5. New, hard to mitigate, DDOS attack using forged DNSSEC queries to
roots, TLDs, large domains with an amplification factor near 100:1.

I'm still looking into the private key recovery issue. I'll try to 
finish that up tonight.



Some comments on incorrect assertions on the NSEC/NSEC3 attacks.

>    (1) there is no cryptographic defense against an attack where the  
> attacker convinces the target that a zone that does not exist at all  
> does exist.
>    (2) replay attacks are possible during the lifetimes of zone  
> signatures, which would either convince the target that a zone that  
> has been removed still exists, or that a zone that has been added does  
> not exist.


> (1) [...] what this  
> limitation means is that your delegations are not signed for free - if  
> you want any security at all out of DNSSEC, you must sign your zone.

One cannot sign zones that don't exist. The NSEC/NSEC3 exploit allows 
one to create zones that don't exist. The end-user can't determine that 
they don't really exist.

> I don't see any way around (2), but would be interested in hearing any  
> proposals you have.   Replay attacks are a problem in protocols with  
> long-lived signatures, and this is one variable to take into account  
> when choosing a zone signature lifetime.

The first thing is to quit telling people that DNSSEC is secure. It
isn't.  One merely does different things (set the DO bit, craft a
response with DNSSEC RRs, etc) to obtain the same objectives as before.

I also propose to obsolete RFC4033, 4034, 4035 and remove the type codes
for DNSKEY, DS, RRSIG, NSEC RR types.

> Also, of course, if I have mischaracterized the limitations to which  
> you refer, I would be interested in being corrected - are there any  
> additional lies that can be told using the second flaw, for example?

The sky is the limit.  Since the zone appears not to exist by (2), it
can be made to exist using (1).  That's also cache poisoning by any 
other name.

                --Dean


-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to