> On Mar 13, 2015, at 7:59 PM, Paul Vixie <p...@redbarn.org> wrote:

> >     Nicholas Weaver Saturday, March 14, 2015 5:07 AM
>> 
>>> ...
>>> 
>>> Overall, unless you are validating on the end host rather than the 
>>> recursive resolver, DNSSEC does a lot of harm from misconfiguration-DOS, 
>>> but almost no good.
>> 
> several of us jumped for joy in 2008 when kaminsky showed rdns poisoning to 
> be a trivial exercise, because it finally provided justification for what was 
> at that time 12 years of apparently-wasted effort on DNSSEC.

But it didn't justify DNSSEC, even at the time.

Between actually adding in a bit more entropy in the request through 0x20 and 
port randomization, and more importantly cleaning up the glue policy for 
recursive resolvers (which Unbound did), you close the door on off-path 
attackers: both making races harder AND eliminating the "race until win" 
property.

In fact, several have viewed the glue policy cleanup which gets to the root 
cause of the Kaminski problem as detrimental specifically because of the desire 
to force DNSSEC adoption.

> so we'll keep pushing the crap system we have, uphill all the way, noone 
> loving it, and almost everyone in fact hating it. we've now spent more 
> calendar- and person-years on DNSSEC than was spent on the entire IPv4 
> protocol suite (including DNS itself) as of 1996 when the DNSSEC effort 
> began. ugly, ugly, ugly.

At which point is it sunk cost fallacy?

"DNS is insecure, live with it" may be the best answer.  Why keep throwing good 
effort after bad?


It certainly is a hell of a lot better than the DOS attack that is recursive 
resolver validation which provides almost no meaningful security gain.

If I was Comcast, after the HBO DNSSEC mess-up, on top of previous mess-ups 
where Comcast inevitably gets the blame, I'd be really really tempted to turn 
OFF DNSSEC validation.  It has failed.

--
Nicholas Weaver                  it is a tale, told by an idiot,
nwea...@icsi.berkeley.edu                full of sound and fury,
510-666-2903                                 .signifying nothing
PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to