In message <70d072392e56884193e3d2de09c097a91f3...@pascal.zaphodb.org>, "Tomas 
L. Byrnes" writes:
> Disclaimer: I have a dog in this fight, since ThreatSTOP is dependent on
> DNS/TCP.
> 
> >-----Original Message-----
> >From: Mark Andrews [mailto:mark_andr...@isc.org]
> >Sent: Thursday, May 14, 2009 4:59 PM
> >To: John Levine
> >Cc: nanog@nanog.org; r...@seastrom.com
> >Subject: Re: you're not interesting,was Re: another brick in the
> wall[ed
> >garden]
> >
> >
> >In message <20090514223605.88104.qm...@simone.iecc.com>, John Levine
> >writes:
> >> >Dear Sprint EVDO people,
> >> >
> >> >Your man-in-the-middle hijacking of UDP/53 DNS queries against
> >> >nameservers that I choose to query from my laptop on Sprint EVDO is
> >> >not appreciated.  Even less appreciated is your complete blocking of
> >> >TCP/53 DNS queries.
> >>
> >> If I were an ISP, and I knew that approximately 99.9% of customer
> >> queries to random name servers was malware doing fake site phishing
> or
> >> misconfigured PCs that will work OK and avoid a support call if they
> >> answer the DNS query, with 0.1% being old weenies like us, I'd do
> what
> >> Sprint's doing, too.
> >
> >     And what's the next protocol that is going to be stomped on?
> >
> >> If you're aware of a mechanical way for them to tell the difference,
> >> we're all ears.
> >
> >     Well you can't answer a TSIG message without knowing the
> >     shared secret so you might as well just let it go through
> >     and avoid some percentage of support calls.  Intercepting
> >     TSIG messages is guaranteed to generate a support call.
> >
> >     Similarly intercepting "rd=3D0" is also guaranteed to generate
> >     a support call.  You almost certainly have a interative
> >     resolver making the query which will not handle the "aa=3D0"
> >     responses.
> >
> >     Similarly there is no sane reason to block DNS/TCP other than
> >     they can do it.
> >
> [TLB:] I can think of an argument they might make: that it is/could be
> used by bots as a fallback. However, redirecting DNS/UDP fits the model
> of "providing a better service for the average user";
> blocking/redirecting TCP is more likely to break things a savvy user
> needs.

        There is still no sane reason to block TCP.  If they are
        intercepting DNS/UDP then they need to also intercept DNS/TCP
        as they will break all sites that cause "tc=1" to be set
        in the DNS/UDP reply.
 
> Maybe someone with clue at Sprint can be persuaded that doing their own
> "OpenDNS" for UDP is probably a good thing for most uses, but doing it
> for TCP is a bad thing for those users who need TCP.

        You can also add to the list of queries that you need to
        provide a clean path for any with DO=1, CD=1 or AD=1.

        Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: mark_andr...@isc.org

Reply via email to