What's to stop someone from writing that malware today? Keeping the net safe by reducing the expressiveness of what is carried over HTTP is already a lost cause, and would have been a slender reed to rely on for security in any case.
On Tue, Jul 12, 2016 at 4:33 PM, Allan Liska <al...@allan.org> wrote: > On 7/12/2016 at 4:10 PM, "Shane Kerr" <sh...@time-travellers.org> wrote: > > John, > > At 2016-07-11 23:50:05 -0000 > "John Levine" <jo...@taugh.com> wrote: > > I'd also want to change some of the motivation text. To me, by far > > the most likely scenario here is javascript applications that want to > > do DNS queries, e.g. for SRV, but can't because javascript doesn't let > > you do that. Now the server that provided the javascript blob can > > also be the DNS proxy. The javascript can't query random other DNS > > proxies due to cross-site scripting rules. > > As I think that I mentioned before, the current draft of DNS-over-HTTP > is poorly suited for JavaScript. Building and parsing DNS binary > messages in JavaScript seems like a really hard way to get at the few > tidbits of information that you actually want. > > OTOH, I am (obviously) not a web developer, so perhaps I overestimate > the difficulty in working with DNS binary-format. Maybe it's a > relatively compact set of JavaScript functions that can be used? > > Maybe I just found a project for the IETF Hackathon? Hm... :) > > > My first thought (and maybe this says more about me than the project) is > that this seems like the perfect way to make a fully self-contained piece > of malware. Ransom32 already proved that you can create ransomware > developed entirely in JavaScript, imagine if you combined a JavaScript DNS > library with a JavaScript TLS library ( > https://github.com/digitalbazaar/forge) you could create a piece of > malware that is significantly harder to detect because all of the network > indicators would be encrypted or not in places that security tools normally > look. Now, it would also be somewhat easy to detect because there are very > few legitimate reasons for someone to be emailing you 25+ Meg .js file. > > I am not saying something shouldn't be done simply because bad guys might > abuse it, otherwise we should have gotten rid of email a long time ago. > What I am asking is are there more legitimate uses for DNS over JavaScript > than there are illegitimate? I don't know the answer, but I don't know if > the "cool" factor outweighs the potential security risk. > > > > allan > > > _______________________________________________ > DNSOP mailing list > DNSOP@ietf.org > https://www.ietf.org/mailman/listinfo/dnsop > >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop