-DDOS: the current situation is that it is very very easy to construct a DNS packet and then the bandwidth requirement to defend DDOS continuely increases. the additional cost will be introduced in the "cookies" scheme, but it will be more flexible in this case because it will be very easy to diffentiate the packets-with-cookies and packets-without-cookies, and the cost will be much lower compared with the DNSSEC. in this point, "cookies" is a light-weight scheme compared with DNSSEC. -cache poison: DNSSEC is better to solve this problem compared with "cookies".
2015-08-03 Zhiwei Yan 发件人: Ted Lemon 发送时间: 2015-08-01 22:36:03 收件人: Paul Hoffman 抄送: 主题: Re: [DNSOP] Seeking more WG Last Call review fordraft-ietf-dnsop-cookies I sent this out on July 20, but unfortunately just to Paul Hoffman. I was puzzled as to why it didn’t get any response on the mailing list, but this explains it… :} On Jul 16, 2015, at 3:52 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote: > > <secretary-hat on> > > Greetings. The WG Last Call for draft-ietf-dnsop-cookies was supposed to end > today, but it got extremely little review during the Last Call. It would be > helpful to all of us if more people can review the document, say what they do > or don't like about it, and so on. I didn’t pay a lot of attention to this when it was being considered for adoption because it seemed notionally like a good idea, but I’ve now read the draft, and I’m rather confused. The document describes several attacks, and describes a mechanism for mitigating them. The method described seems as if it would function. However, I don’t see any way in which the proposed method actually mitigates the attacks that are described in the document. I also don’t see whether there are incentives for anybody to implement it. So I actually oppose publication of the document as a standard, because it’s going to wind up on some RFP checklist, and we’re going to have to implement it, but I don’t see how it’s actually going to help anyone. To expand a bit on this, the document describes two attacks that this method is intended to mitigate: DDoS and Cache poisoning. Let’s consider how the proposed mechanism would work for these. For DDoS, the cache or auth server is presumably going to decide whether to process a request based on whether the resolver on the client sent the right cookie. An attacker can’t receive the server cookie, so it can’t send it. This sounds great in theory, but now we have the server processing cookies in order to avoid processing something else. And this requires that all query sources support cookies; if they don’t, you don’t get any benefit, but you still get the cost. So is there some basis for thinking that we would see widespread support for DNS cookies on all resolvers? I find this unlikely. So we’ve actually created a new problem, rather than solving an old problem. For cache poisoning, who are we protecting? The document says that we are protecting the resolver, which could either mean the stub resolver on the client or the caching resolver. So I’m going to assume we mean the caching resolver. I suppose the theory here is that there is an incentive for auth servers to implement DNS cookies, and if they do we can avoid attacks, but again I’m not clear on how this is expected to work in practice. In practice we see that DNS server conformance by server providers is pretty abysmal. If it were the case that we had some way to know in advance that a particular auth server supported cookies, maybe that would work, but we don’t. So what we wind up with is that the caching resolver now needs to maintain a list of auth servers, mark whether these authors support cookies, and discard non-cookie responses to queries sent to those servers, in order to incentivize auth server operators to support cookies. Which sounds great until you consider that we now have a possible new DoS attack. It’s a little hard to implement, because you need to be on-path, but we’ve seen that being on-path isn’t really all that hard. So now I can intercept a query to a site I want to attack, respond with a cookie, and now that site is on the supports-cookie list. So if it doesn’t support cookies, the cookie-supporting cache will see a server failure, and now that domain is offline. So we have to do a lot of work, and I guess we get a little protection, but we have new risks. Whereas DNSSEC actually solves the problem. So if we are going to incentivize people to implement something, why not incentivize them to implement DNSSEC, rather than a very limited yet expensive half-measure? _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop