On Thu, 11 Sep 2008, Kurt Erik Lindqvist wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> 
> (CC trimmed)
> 
> Having worked for a tier-1 provider and started two ISPs in the past,  
> I am certain that BCP38 won't be universally deployed as that is  
> operationally very hard and costly in larger networks. This  
> effectively means that there will still be attack vectors open using  
> recursive reflectors. 

BCP38 non-deployment means that there will be all kinds of spoofed
source IP address attacks, not just open recursor attacks. 

I have personal experience with some rooted systems, recently. The
botnet software that I've seen on these rooted systems doesn't include
programs for exploiting open recursors.

> Attacks using open recursors are real. 

I don't dispute there have been open recursor attacks. However the
attacks appear to be contrived and solicited, lacking in number,
lacking in intensity, and lacking in actual damage.

There is no problem that needs to be solved. There is serious 'unclean 
hands' on the proponents for having solicited attacks, and for profiting 
from closing open recursors with DNSSEC software sales.

> I wish I could share data or evidence, but as is usually the case in
> security operations, people are not very happy to share the details.

Secret evidence that no one can share, and secret harms that no one has
ever reported in the press or in security forums.  Maybe we can have a
super-secret 'recursors-are-evil' document that is never published, 
because the problem is so secret.

> The best we have is what I assume is the data point from the largest
> commercial observer and regular study (Danny's survey) from the global
> operations forums. Dean has already decided that to disregard that
> data, so I have no idea what other public source of data he would
> trust.

NANOG represents a tiny minority of the internet operations community,
just in North America. As has already been pointed out, ARIN has about
3000 members, and NANOG represents a few hundred. NANOG has previously
deceived the public on similar matters.
http://www.iadl.org/nanog/nanog-story.html

If this is a real problem, there should be some clamor from the 
thousands of ISPs worldwide.  There is no such clamor.  There is only a 
clamor from some DNSSEC advocates who have solicited open recursor 
attacks. Some of these folks have also previously deceived the public on 
similar matters, see http://www.iadl.org/maps/maps-story.html.

                --Dean


-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   


_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to