Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Jelte Jansen

Ralf Weber wrote:

No redirection on SERVFAIL seems to be a strange recommendation.
Wouldn't this be a very good reason to provide a diagnostics page,
especially if there's been a DNSSEC validation failure?

This sounds like an excellent idea to help DNSSEC adoption and
is something that should go into the draft.



then a SERVFAIL will also result in an e-mail bounce that says connection 
refused instead of DNS error (assuming there's no e-mail sink on the host that 
is redirected to). Fun times for the helpdesk.


I have the impression that even though it tries not to, the document still 
assumes that web==internet, mentioning problems 'non-web clients' only as a 
small side-effect, while imho it should be one of the main concerns (the 
www-case is the easy one).


Also, I don't see how the ISP trust anchor for DNSSEC would work (not knowing 
the actual zone that it is supposed to cover in advance); it might be a better 
idea to simply disable all redirects on DO==1.


Then again, I am of the persuasion that messing with a core protocol on the fly 
is simply asking for trouble, and disabling redirection should be top priority 
for everyone.


Jelte
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Florian Weimer
* Ralf Weber:

> That really is an issue and could be addressed, there are a lot of
> case where a A record for a domain doesn't exists, but one for
> www.domain does exist.

True, and some browser have code to deal with this.

> Question then would be how that rewrite should be presented. As a
> normal A answer or as CNAME referral which might be better as the
> underlying web server might not answer for the domain without www.

You can't create a CNAME alias to subdomain. And CNAMEs are not
type-specific, so this would obscure SOA/NS/etc. at the zone apex.

> That is not the intention and not what I read there. Diversion of
> powers is a concept that is not even common among "western
> democracies". The text tries to stay away from these political
> issues, and instead makes clear that the local law, goverenment or
> jurisdictions should be honored where appropriate.

Can't you omit this stuff altogether?
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Roy Arends

On Jul 9, 2009, at 5:23 PM, Livingood, Jason wrote:

I submitted this draft, which you can find at http://tools.ietf.org/html/draft-livingood-dns-redirect-00 
, before the –00 cutoff on Monday, and it will be discussed in the  
DNSOP WG meeting at IETF 75 (it is listed on the agenda).


If anyone is interested and has time before IETF 75, I’m happy to  
take feedback before then obviously.  Please note that there is a  
list of open items at the end, which we plan to address in  
subsequent versions.


This part of section 10 is troublesome:

So the only case where DNS security extensions cause problems for  
DNS Redirect is with a validating stub resolver. This case doesn't  
have widespread deployment now and could be mitigated by using trust  
anchor, configured by the applicable ISP or DNS ASP, that could be  
used to sign the redirected answers.


This mitigation strategy just doesn't work, and for a very good  
reason, as it allows a downgrade attack.


As for the rest of the document, I think it overloads the term  
"redirection" by incorporating lawfully mandated filtering (whatever  
that means), and therefor wrongly justifying this practice altogether.


In general, this kind of muddling with the DNS protocol assumes that  
the sole purpose of the DNS is to allow a web-browser find the address  
of a web-server. Clearly it is not.


There are alternatives. I run unbound from my laptop. Windows users  
can do too: http://unbound.net/downloads/unbound_setup_1.3.1.exe


Other alternatives are OARC's ODVR: https://www.dns-oarc.net/oarc/services/odvr

Kind regards,

Roy Arends
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Florian Weimer
* Jelte Jansen:

> Ralf Weber wrote:
>>> No redirection on SERVFAIL seems to be a strange recommendation.
>>> Wouldn't this be a very good reason to provide a diagnostics page,
>>> especially if there's been a DNSSEC validation failure?
>> This sounds like an excellent idea to help DNSSEC adoption and
>> is something that should go into the draft.
>>
>
> then a SERVFAIL will also result in an e-mail bounce that says
> connection refused

Not a hard 5xx error?

> instead of DNS error (assuming there's no e-mail
> sink on the host that is redirected to). Fun times for the helpdesk.

Only if the mail server falls back to the A record if the MX lookup
results in SERVFAIL, which seems like a questionable approach to me.

Anyway, I think DNS rewriting is mainly for folks who also block
25/TCP in- and outgoing or list the address space on the PBL and
similar DNSBLs, so the SMTP argument is not really valid anymore.

> Also, I don't see how the ISP trust anchor for DNSSEC would work (not
> knowing the actual zone that it is supposed to cover in advance); it
> might be a better idea to simply disable all redirects on DO==1.

You can't use trust anchors to guide rewriting.  You need to look at
the zone contents to see what can be done.  With NSEC3 opt-out,
there's still lots of wiggle room (at least initially).  Generally not
spoofing on DO==1 is easier, of course.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Jelte Jansen

Florian Weimer wrote:

* Jelte Jansen:


Ralf Weber wrote:

No redirection on SERVFAIL seems to be a strange recommendation.
Wouldn't this be a very good reason to provide a diagnostics page,
especially if there's been a DNSSEC validation failure?

This sounds like an excellent idea to help DNSSEC adoption and
is something that should go into the draft.


then a SERVFAIL will also result in an e-mail bounce that says
connection refused


Not a hard 5xx error?



not unless there's also a specific 5xx error generator listening on the host 
that is redirected to, i guess.



instead of DNS error (assuming there's no e-mail
sink on the host that is redirected to). Fun times for the helpdesk.


Only if the mail server falls back to the A record if the MX lookup
results in SERVFAIL, which seems like a questionable approach to me.



is it? (i'm asking, i don't know; even the updated smtp rfc seems a bit unclear 
about that)



Anyway, I think DNS rewriting is mainly for folks who also block
25/TCP in- and outgoing or list the address space on the PBL and
similar DNSBLs, so the SMTP argument is not really valid anymore.



well in that case it might be worth adding a section that your own services 
should definitely not have the same resolvers that you have set up for your 
customers, and that a separate non-lying resolver should be set up for those.


But this is just an example of an unintended side effect from assuming that only 
web browsers ask for A/.


Jelte
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Tony Finch
On Mon, 13 Jul 2009, Florian Weimer wrote:
> * Jelte Jansen:
> >
> > then a SERVFAIL will also result in an e-mail bounce that says
> > connection refused
>
> Not a hard 5xx error?

No, both SERVFAIL and connection refused are equivalent to 4yz temporary
failures.

> > instead of DNS error (assuming there's no e-mail
> > sink on the host that is redirected to). Fun times for the helpdesk.
>
> Only if the mail server falls back to the A record if the MX lookup
> results in SERVFAIL, which seems like a questionable approach to me.

Yes, it would be wrong to do that.

> Anyway, I think DNS rewriting is mainly for folks who also block
> 25/TCP in- and outgoing or list the address space on the PBL and
> similar DNSBLs, so the SMTP argument is not really valid anymore.

The draft should probably say something like that explicitly.

However there's an unbounded number of similar problematic examples: what
if the user is running an XMPP server?

RFC 4084 is probably relevant.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Antoin Verschuren
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

> -Original Message-
> From: dnsop-boun...@ietf.org [mailto:dnsop-boun...@ietf.org] On Behalf Of
> Stephane Bortzmeyer
> Subject: Re: [DNSOP] Review of draft-livingood-dns-redirect-00
> 
> Disclaimer: I find the whole idea a very bad one, a violation of
> network neutrality and certainly a service I would never accept from
> my ISP.

While I strongly agree with Stephane's sentiment here, I do see some merits in 
describing why it is a bad idea instead of describing how it should be done 
with as little problems as possible (but still with problems).

First thing that comes up is the lawyers and marketing concept that http is the 
Internet.
The document is trying to avoid that discussion by saying that deep packet 
inspection should occur to determine that an http request was made, but then 
we're not talking DNS anymore. I get the strong feeling this is fundamentally 
against what RFC4367 is arguing about.
Not only is it not true that the majority is only doing simple web browsing, 
but there are more and more applications and use of http, that would not allow 
a landing page to work.
I can think of alternative ports of web pages that do http, but also 
application that use http on port 80 without it being a web browser. Think of 
embedded http video streaming, or other applications that use the http protocol 
without being a browser. More and more apps work like that.

Another use case that I see a lot in small and medium size companies and even 
in the consumer market, and that I don't see described in the document is where 
a company runs 1 resolver on its own network and uses the resolver of its ISP 
as a backup or other redundancy reasons. If the ISP's resolver has a different 
truth than the own resolver, things will go very bad on the user experience 
side. The DNS is the DNS. There should not be multiple versions of the truth on 
the network.

And finally, I also don't see a description on how things might go wrong if 
resolvers are behind a load balancer, and the 2 or more resolvers behind it 
don't have the same filtering policy in place.

All in all I see more use cases where it degrades the user experience instead 
of improving it, and therefore it's a bad idea to do this in the network.
It will force end-users to deploy their own resolvers and validators to get a 
better user experience, and while that might seem infeasible today for ordinary 
users, I can't wait for the first app to arrive that has a resolver built in 
instead of using the default OS resolver to bypass that trouble.
Perhaps that built in resolver will even do DNS over http ! :-).
Because that will downscale the use of cached responses, I wouldn't want to go 
that path as it would increase the load on authoritative servers.

The only feasible use I see for a landing page is where it is invoked by an 
end-point in terms of a web browser that has it explicitly configured to go 
there when an NXDOMAIN is received by the application.



Antoin Verschuren

Technical Policy Advisor SIDN
Utrechtseweg 310, PO Box 5022, 6802 EA Arnhem, The Netherlands

P: +31 26 3525500  F: +31 26 3525505  M: +31 6 23368970
mailto:antoin.verschu...@sidn.nl  xmpp:ant...@jabber.sidn.nl  
http://www.sidn.nl/
-BEGIN PGP SIGNATURE-
Version: 9.6.3 (Build 3017)

wsBVAwUBSlsgUzqHrM883AgnAQgkFAgAjM/RguYXdKVL+/CeBK2OP2JsqsK1bVD6
nBmho2lpWNOh1pTllJYX5eaJzF24wDZ0P062u52P8qDMOuXOoKWP+pNRSvDKIzj6
XEyt5HazpnlY5+0mohuwDvNjRR9im2VN0vpt5LZhs3Z0EJR5ShHJJuU/xY6B5UoP
QlEMyBfZZ3PPZSoR2AR4jJO9wTraDS5Q+zkwWSYUoIQskjBMGNjqhPfFF1m6IAoC
UA4HWEDDQVfmY/mXtmCDigw4NorIJk2oakjSdYuF7MSaS3N3r1a0jnMNdHaV5LEg
ddR2ieOc+VkXtLa7f+LNb2gJrtwaqlKoUKDWzFjVeAHzxzeLj9EydA==
=eKJQ
-END PGP SIGNATURE-

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Roy Arends

On Jul 13, 2009, at 1:53 PM, Antoin Verschuren wrote:


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256


-Original Message-
From: dnsop-boun...@ietf.org [mailto:dnsop-boun...@ietf.org] On  
Behalf Of

Stephane Bortzmeyer
Subject: Re: [DNSOP] Review of draft-livingood-dns-redirect-00

Disclaimer: I find the whole idea a very bad one, a violation of
network neutrality and certainly a service I would never accept from
my ISP.


While I strongly agree with Stephane's sentiment here, I do see some  
merits in describing why it is a bad idea instead of describing how  
it should be done with as little problems as possible (but still  
with problems).


SSAC's Report on DNS Response Modification
http://www.icann.org/en/committees/security/sac032.pdf

IAB Commentary Architectural Concerns on the use of DNS Wildcards
http://www.iab.org/documents/docs/2003-09-20-dns-wildcards.html

Kind regards,

Roy Arends
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Good guidance on Informational vs. BCP.  We may get there eventually, but I
thought that starting as a draft BCP might provoke more detailed and useful
debate.  ;-)

On the topic of Œlying resolvers¹ though, that seems a bit strong IMHO.  But
perhaps I have missed a strong MUST statement (per RFC 2119) in a relevant
RFC that you could refer me to?

Jason


On 7/11/09 7:59 PM, "Paul Hoffman"  wrote:

> It seems inappropriate for the IETF to bless lying resolvers as a Best Current
> Practice. I doubt we as a community could have consensus on when lying is
> good, when it is neutral, and when it is bad. Without such agreement, we can't
> agree on how to run such servers. Having said that, the publication of a
> document such as this (with more input from the community) as a Informational
> RFC could indeed help the Internet.
> 
> --Paul Hoffman, Director
--VPN Consortium
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Thx for the feedback.  I will try to address your concern in the ­01
revision.  If you have any specific textual recommendations, let me know.

Jason


On 7/12/09 3:34 AM, "Florian Weimer"  wrote:

> * Stephane Bortzmeyer:
> 
>> > Unless I'm wrong, the I-D about lying resolvers do not discuss the
>> > issue of zone cuts.
>> >
>> > If I type www.doesnotexistatall.com (the SLD does not exist and so I
>> > should get a NXDOMAIN), I get the IP address of the ad Web server. If
>> > I type .afnic.fr, I will get this IP address as well, since the
>> > QNAME does not exist (four 'w' instead of three) despite the fact that
>> > the SLD does exist.
> 
> This also interacts very badly the subdomain-based web trust model, so
> it should be mentioned in the Security Considerations section.
> 



Regards,
Jason
 
Jason Livingood
Executive Director
Internet Systems Engineering
National Engineering & Technical Operations
Comcast Cable Communications
215-286-7813
jason_living...@cable.comcast.com
 
This message and any attachments to it may contain PROPRIETARY AND
CONFIDENTIAL INFORMATION exclusively for intended recipients. Please DO NOT
FORWARD OR DISTRIBUTE to anyone else. If you are not the intended recipient,
please contact the sender and delete all copies of this e-mail from your
system.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Thx for the **very detailed** and thoughtful feedback.  I will review &
respond in detail when I start working on the ­01 revision.

Jason


On 7/12/09 4:30 AM, "Florian Weimer"  wrote:

> * Jason Livingood:
> 
>> > If anyone is interested and has time before IETF 75, I¹m happy to take
>> > feedback before then obviously.
> 
> Few players perform NXDOMAIN rewriting.  Instead, ANCOUNT=0 rewriting
> is used.  This causes all kinds of problems, including redirections
> for example.com when it hasn't got an A record (where some browser
> would just fall back to www.example.com), and bad interactions with
> IPv6 deployment (because all IPv6-only hosts suddenly have got an A
> record).
> 
> The malicious site protection does not work reliably because it can be
> easily bypassed by the attacker, using IP addresses.
> 
> Section 5.3 is pretty explicit in that government-mandated filtering
> decisions should be made by executive organs, and not the judiciary.
> The IETF should not try to regulate this and should certainly show
> more respect for separation of powers.  It should mention that
> DNS-based filtering is not acceptable to many governments because it
> can be bypassed easily, and it is not possible to block content on
> popular sites where the collateral damage of a domain-wide block would
> be problematic.
> 
> Section 7.1 should be more strongly worded.  Rewriting stuff like
> search.msn.com (and reverse-proxying the HTTP traffic) must not be
> condoned by a RFC.  Such things are just evil.
> 
> No redirection on SERVFAIL seems to be a strange recommendation.
> Wouldn't this be a very good reason to provide a diagnostics page,
> especially if there's been a DNSSEC validation failure?
> 
> As it stands, the product list in Section 8.3 serves no particular
> purpose.  Some analysis which browser-based mechanisms are broken by
> DNS redirection might be helpful, but this could be done in a
> product-independet manner.
> 
> Section 8.4 should mention that some (most?) rewriters do not rewrite
> subtrees which involve a delegation from the TLD level.  This
> addresses a huge range of technical issues.
> 
> DNSSEC interoperability doesn't work the way you expect because once
> the resolver is security-aware, it will set the DO bit queries, and
> you cant tell the non-validating resolvers from the validating ones.
> It's also not an all-or-nothing thing because validation depends on
> availability of trust anchors.  So you'd have to spoof your answer
> according what's permitted by the signed data (particularly the
> NSEC(3) records; you don't have to validate the signatures yourself).
> 
> The draft must mention DNSBL interactions (and, more generally, the
> impact on applications which use DNS as a transport for RPC).  It
> should describe approaches how to mitigate issues identified (such as
> the IPv6 problem), and show the impact in terms of increased query
> count.
> 
> There's also a policy impact for ICANN.  Restricted TLDs such as .tel
> are not feasible if DNS rewriting essentially removes restriction on
> TLD contents.  This also applies to e164.arpa subtrees, where some
> national regulators have requested that their subtrees can only be
> used for ENUM (and not arbitrary DNS information).
> 
> While I'm mostly with Stephane regarding the merits of DNS rewriting,
> I think the IETF could still publish a draft on this topic.  However,
> it should present pretty stringent requirements which ensure that
> rewriting does not adversely impact operations.  The current draft is
> closer to a fig leaf, I'm afraid.
> 



Regards,
Jason
 
Jason Livingood
Executive Director
Internet Systems Engineering
National Engineering & Technical Operations
Comcast Cable Communications
215-286-7813
jason_living...@cable.comcast.com
 
This message and any attachments to it may contain PROPRIETARY AND
CONFIDENTIAL INFORMATION exclusively for intended recipients. Please DO NOT
FORWARD OR DISTRIBUTE to anyone else. If you are not the intended recipient,
please contact the sender and delete all copies of this e-mail from your
system.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Good feedback, which I will take into consideration for our ­01 revision.
Please do note that Section 10 is definitely immature, as we noted in the
Open Issues (#5) in Appendix B.  We¹ll be developing this section quite a
bit.

Thanks
Jason


On 7/13/09 4:12 AM, "Roy Arends"  wrote:

> On Jul 9, 2009, at 5:23 PM, Livingood, Jason wrote:
> 
>> > I submitted this draft, which you can find at
>> http://tools.ietf.org/html/draft-livingood-dns-redirect-00
>> > , before the ­00 cutoff on Monday, and it will be discussed in the
>> > DNSOP WG meeting at IETF 75 (it is listed on the agenda).
>> >
>> > If anyone is interested and has time before IETF 75, I¹m happy to
>> > take feedback before then obviously.  Please note that there is a
>> > list of open items at the end, which we plan to address in
>> > subsequent versions.
> 
> This part of section 10 is troublesome:
> 
>  So the only case where DNS security extensions cause problems for
> DNS Redirect is with a validating stub resolver. This case doesn't
> have widespread deployment now and could be mitigated by using trust
> anchor, configured by the applicable ISP or DNS ASP, that could be
> used to sign the redirected answers.
> 
> This mitigation strategy just doesn't work, and for a very good
> reason, as it allows a downgrade attack.
> 
> As for the rest of the document, I think it overloads the term
> "redirection" by incorporating lawfully mandated filtering (whatever
> that means), and therefor wrongly justifying this practice altogether.
> 
> In general, this kind of muddling with the DNS protocol assumes that
> the sole purpose of the DNS is to allow a web-browser find the address
> of a web-server. Clearly it is not.
> 
> There are alternatives. I run unbound from my laptop. Windows users
> can do too: http://unbound.net/downloads/unbound_setup_1.3.1.exe
> 
> Other alternatives are OARC's ODVR:
> https://www.dns-oarc.net/oarc/services/odvr
> 
> Kind regards,
> 
> Roy Arends
> 

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Thanks for the suggestion, Tony.  I will add that to my tracking list for
the next revision (and may email you to confirm what I have might be
satisfactory).  I think we probably also need to address the fact that mail
servers should not use resolvers that perform DNS redirect (this was assumed
but should be explicit).

Regards
Jason
> 
>> > Anyway, I think DNS rewriting is mainly for folks who also block
>> > 25/TCP in- and outgoing or list the address space on the PBL and
>> > similar DNSBLs, so the SMTP argument is not really valid anymore.
> 
The draft should probably say something like that explicitly.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Tony Finch
On Mon, 13 Jul 2009, Livingood, Jason wrote:

> I think we probably also need to address the fact that mail servers
> should not use resolvers that perform DNS redirect (this was assumed but
> should be explicit).

I think you need to widen that caveat: anything that isn't a web browser
should not use a DNS server that misbehaves as described in this draft.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Rose, Scott W.
On 7/13/09 10:08 AM, "Tony Finch"  wrote:

> On Mon, 13 Jul 2009, Livingood, Jason wrote:
> 
>> I think we probably also need to address the fact that mail servers
>> should not use resolvers that perform DNS redirect (this was assumed but
>> should be explicit).
> 
> I think you need to widen that caveat: anything that isn't a web browser
> should not use a DNS server that misbehaves as described in this draft.
> 
How would these servers identify themselves?  And should clients believe
servers that report they do not send back altered replies?

This might work, but there would need to be a way for DNS resolvers to
announce their configuration (e.g. redirect yes/no, DNSSEC yes/no, etc),
which isn't available today.

Scott

> Tony.
> --
> f.anthony.n.finchhttp://dotat.at/
> GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
> MODERATE OR GOOD.
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
> 

===
Scott Rose
NIST
sco...@nist.gov
ph: +1 301-975-8439
http://www-x.antd.nist.gov/dnssec
http://www.dnsops.gov/
===


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Ray . Bellis
> I think we probably also need to address 
> the fact that mail servers should not use resolvers that perform DNS
> redirect (this was assumed but should be explicit).

At least when you do it on your recursive servers you're only affecting 
your own customers, who in most cases can vote with their wallets when 
they don't like it.

When it's done on the authoritative servers no-one has a choice :(

Ray
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Paul Hoffman
At 9:55 AM -0400 7/13/09, Livingood, Jason wrote:
>On the topic of 'lying resolvers' though, that seems a bit strong IMHO.  But 
>perhaps I have missed a strong MUST statement (per RFC 2119) in a relevant RFC 
>that you could refer me to?  

I am not aware of an RFC that says something to the effect of "when you are 
responsible for translating addresses and you get some information that was 
requrested, you MUST NOT lie about it to the requester", but it might exist. 
But that's immaterial. Even if the resolver has a good reason to lie, it is 
lying, and your document should encourage the resolver to be honest about that 
fact. The recipient might not care, or might very much want to be lied to to 
protect the recipient from doing something dangerous, but it should be made 
aware, if possible, that it is talking to a lying resolver.

--Paul Hoffman, Director
--VPN Consortium
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Paul Wouters

On Mon, 13 Jul 2009, Tony Finch wrote:


I think you need to widen that caveat: anything that isn't a web browser
should not use a DNS server that misbehaves as described in this draft.


I think you need to widen that caveat: anything should not use a DNS server
that misbehaves as described in this draft.

Paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Todd Glassey

Paul Hoffman wrote:

At 9:55 AM -0400 7/13/09, Livingood, Jason wrote:
  
On the topic of 'lying resolvers' though, that seems a bit strong IMHO.  But perhaps I have missed a strong MUST statement (per RFC 2119) in a relevant RFC that you could refer me to?  



I am not aware of an RFC that says something to the effect of "when you are responsible for translating addresses and you get some information that was requrested, you MUST NOT lie about it to the requester", but it might exist. 
That would be in the SLA the provider agrees to provide service under. 
Its part of the warranty for fitness, so while its not in the Standard 
itself - the use of the Standard to commit electronic fraud with will 
have criminal blow-back as well Paul.

But that's immaterial. Even if the resolver has a good reason to lie, it is 
lying, and your document should encourage the resolver to be honest about that 
fact. The recipient might not care, or might very much want to be lied to to 
protect the recipient from doing something dangerous, but it should be made 
aware, if possible, that it is talking to a lying resolver.

--Paul Hoffman, Director
--VPN Consortium
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop



No virus found in this incoming message.
Checked by AVG - www.avg.com 
Version: 8.5.375 / Virus Database: 270.13.12/2234 - Release Date: 07/12/09 17:56:00


  


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Paul Hoffman
At 1:48 PM -0400 7/13/09, Paul Wouters wrote:
>On Mon, 13 Jul 2009, Tony Finch wrote:
>
>>I think you need to widen that caveat: anything that isn't a web browser
>>should not use a DNS server that misbehaves as described in this draft.
>
>I think you need to widen that caveat: anything should not use a DNS server
>that misbehaves as described in this draft.

Paul: that's over the top. Some of the services defined in the draft are highly 
desired by some Internet users. You may not like them, and that's fine. Your 
statement is akin to, and as useful as, the "NATs are bad so we shouldn't talk 
about them" debate that flares in the IETF approximately biannually.

--Paul Hoffman, Director
--VPN Consortium
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Andrew Sullivan
Dear colleagues,

On Thu, Jul 09, 2009 at 11:23:48AM -0400, Livingood, Jason wrote:
> If anyone is interested and has time before IETF 75, I¹m happy to take
> feedback before then obviously.  Please note that there is a list of open
> items at the end, which we plan to address in subsequent versions.

I have read draft-livingood-dns-redirect-00.  I have some (actually,
many) comments.  I write as a contributor of the DNS Operations
working group and not in any other capacity (especially not as co-chair
of DNSEXT).  I will leave it for others to debate the extent to which
the document actually proposes changes to the DNS protocol.  I
apologise for the length of this mail, but it seemed best to me to go
over the document in detail.

To begin with, I must state that I am opposed to adopting the draft as
it stands as a working group item with a target of BCP.  That said, I
agree that if people are going to do these sorts of things, it'd be
better that we have a document to explain what the least bad way to do
them is (although one might be excused for wondering what "least bad"
means in a context such as this).  It is a fact that people are doing
these DNS tricks, and we will not be saved from them by refusing to
talk about them any more than we were saved from the stupidest
possible NAT implementations by the IETF's collective refusal to work
on NAT.  Still, I am not sure that the document as it currently stands
represents that "least bad", so there's some work to do.

First, in section 3 we have a note that there are alternative
strategies to DNS redirects.  It is one thing to rule discussion of
those alternatives out of scope; it is quite another to present the
alternatives as completely neutral.  This discussion should be
strengthened to point out that performing redirects in the DNS have
extremely wide consequences, and that the DNS-based approach is a
terribly blunt instrument to perform what is intended to be surgical
redirections, akin to doing an appendectomy with a club.  In addition,
I think the discussion should point out that DNS-based redirection
violates the basic principle of the DNS: it is supposed to be a
distributed, loosely-coherent database of records originally provided
by authoritative sources of data.  DNS redirections violate that
principle by design, even if they do it for the noblest reasons.  This
is an important factor in the discussion of DNSSEC, to which I'll turn
near the end of this message.

I note this text in section 5.1.3:

   Design considerations for the Web Error Search and Malicious Site
   Protection services should include properly and promptly
   terminating non-HTTP connection requests.

I would find it helpful if the draft included some text explaining how
to terminate "non-HTTP connection requests" (and make a subsequent
connection request operate correctly)?  There's nothing in the DNS
request that would tell a resolver whether the DNS query was happening
because the client planned to make an http connection as opposed to
something else.  Is the idea to monitor DNS requests, then sniff the
traffic to see if it's an HTTP request and then do something with that
knowledge?  (This sounds just shy of practically impossible to me, but
I'd be happy to be wrong.)  What about https requests?  Surely,
malware people will quickly learn to send the requests via https if
that's a clear path, so that won't work.  And anyway, one can't sniff
encrypted traffic.

In section 5.2.3, it says

   A range of resource records may be redirected, such as A,
   , MX, SRV, and NAPTR records, in order to fulfill the objective
   of preventing access to certain network elements containing malicious
   content or which and in some way used to transmit, relay, or
   otherwise transfer malicious content.  All other resource record
   types must be answered as if there was no redirection.

I think the last sentence is just a rhetorical flourish.  It seems to
say that any RR may be redirected, depending on the objective; but
other ones must (MUST?  I suppose this depends on where one stands on
2119 language in BCPs.  If the authors want 2119 language, there are
some other places that could do with it too) be answered as if there
were no redirection.  This boils down to, "Redirect whatever you think
you need to."  So the last sentence in the quoted bit is just
decoration: it merely makes the passage read as though the technique
isn't too invasive, but it has no practical effect.  (Section 5.5 has
this, too.)

Section 5.3 ought to point out that legally-mandated DNS redirect may
do harm, because the ability to send desirable traffic (such as
cease-and-desist emails, for instance) is lost (this is especially
important in light of the discussion of proxy servers at the end of
5.3.3).  Section 5.3.3 reads like it was written by actual lawyers
(note that in my idiolect, "lawyer" is not automatically a term of
derision): there are here a lot of and/ors, other slashes, and lists
of possible authoriti

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Livingood, Jason
Great and detailed feedback on our first draft, Andrew.  I'll take a reply
in detail, point-by-point, when I start working on -01 with my co-authors
and contributors.

Thanks
Jason


On 7/13/09 4:29 PM, "Andrew Sullivan"  wrote:

> Dear colleagues,

On Thu, Jul 09, 2009 at 11:23:48AM -0400, Livingood, Jason
> wrote:
> If anyone is interested and has time before IETF 75, I¹m happy to
> take
> feedback before then obviously.  Please note that there is a list of
> open
> items at the end, which we plan to address in subsequent versions.

I
> have read draft-livingood-dns-redirect-00.  I have some (actually,
many)
> comments.  I write as a contributor of the DNS Operations
working group and
> not in any other capacity (especially not as co-chair
of DNSEXT).  I will
> leave it for others to debate the extent to which
the document actually
> proposes changes to the DNS protocol.  I
apologise for the length of this
> mail, but it seemed best to me to go
over the document in detail.

To begin
> with, I must state that I am opposed to adopting the draft as
it stands as a
> working group item with a target of BCP.  That said, I
agree that if people
> are going to do these sorts of things, it'd be
better that we have a document
> to explain what the least bad way to do
them is (although one might be excused
> for wondering what "least bad"
means in a context such as this).  It is a fact
> that people are doing
these DNS tricks, and we will not be saved from them by
> refusing to
talk about them any more than we were saved from the
> stupidest
possible NAT implementations by the IETF's collective refusal to
> work
on NAT.  Still, I am not sure that the document as it currently
> stands
represents that "least bad", so there's some work to do.

First, in
> section 3 we have a note that there are alternative
strategies to DNS
> redirects.  It is one thing to rule discussion of
those alternatives out of
> scope; it is quite another to present the
alternatives as completely neutral.
> This discussion should be
strengthened to point out that performing redirects
> in the DNS have
extremely wide consequences, and that the DNS-based approach
> is a
terribly blunt instrument to perform what is intended to be
> surgical
redirections, akin to doing an appendectomy with a club.  In
> addition,
I think the discussion should point out that DNS-based
> redirection
violates the basic principle of the DNS: it is supposed to be
> a
distributed, loosely-coherent database of records originally provided
by
> authoritative sources of data.  DNS redirections violate that
principle by
> design, even if they do it for the noblest reasons.  This
is an important
> factor in the discussion of DNSSEC, to which I'll turn
near the end of this
> message.

I note this text in section 5.1.3:

   Design considerations for the
> Web Error Search and Malicious Site
   Protection services should include
> properly and promptly
   terminating non-HTTP connection requests.

I would
> find it helpful if the draft included some text explaining how
to terminate
> "non-HTTP connection requests" (and make a subsequent
connection request
> operate correctly)?  There's nothing in the DNS
request that would tell a
> resolver whether the DNS query was happening
because the client planned to
> make an http connection as opposed to
something else.  Is the idea to monitor
> DNS requests, then sniff the
traffic to see if it's an HTTP request and then
> do something with that
knowledge?  (This sounds just shy of practically
> impossible to me, but
I'd be happy to be wrong.)  What about https requests?
> Surely,
malware people will quickly learn to send the requests via https
> if
that's a clear path, so that won't work.  And anyway, one can't
> sniff
encrypted traffic.

In section 5.2.3, it says

   A range of resource
> records may be redirected, such as A,
   , MX, SRV, and NAPTR records, in
> order to fulfill the objective
   of preventing access to certain network
> elements containing malicious
   content or which and in some way used to
> transmit, relay, or
   otherwise transfer malicious content.  All other
> resource record
   types must be answered as if there was no redirection.

I
> think the last sentence is just a rhetorical flourish.  It seems to
say that
> any RR may be redirected, depending on the objective; but
other ones must
> (MUST?  I suppose this depends on where one stands on
2119 language in BCPs.
> If the authors want 2119 language, there are
some other places that could do
> with it too) be answered as if there
were no redirection.  This boils down to,
> "Redirect whatever you think
you need to."  So the last sentence in the quoted
> bit is just
decoration: it merely makes the passage read as though the
> technique
isn't too invasive, but it has no practical effect.  (Section 5.5
> has
this, too.)

Section 5.3 ought to point out that legally-mandated DNS
> redirect may
do harm, because the ability to send desirable traffic (such
> as
cease-

Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread YAO Jiankang
Review of draft-livingood-dns-redirect-00I think that dns redirection is a 
double-sword. it will be good if it is used by good guy; it will be bad if it 
is used by bad guy.

ICANN SSAC suggest to forbid the use of dns redirction. pls see 
http://syd.icann.org/files/meetings/sydney2009/presentation-ssac-prohibiting-redirection-22jun09-en.pdf.

this draft is more suitable for informational.


Yao Jiankang
CNNIC
  - Original Message - 
  From: Livingood, Jason 
  To: dnsop@ietf.org 
  Sent: Thursday, July 09, 2009 11:23 PM
  Subject: [DNSOP] Review of draft-livingood-dns-redirect-00


  I submitted this draft, which you can find at 
http://tools.ietf.org/html/draft-livingood-dns-redirect-00, before the -00 
cutoff on Monday, and it will be discussed in the DNSOP WG meeting at IETF 75 
(it is listed on the agenda).

  If anyone is interested and has time before IETF 75, I'm happy to take 
feedback before then obviously.  Please note that there is a list of open items 
at the end, which we plan to address in subsequent versions.

  Regards,
  Jason 


--


  ___
  DNSOP mailing list
  DNSOP@ietf.org
  https://www.ietf.org/mailman/listinfo/dnsop
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-13 Thread Alan Barrett
On Thu, 09 Jul 2009, Livingood, Jason wrote:
> I submitted this draft, which you can find at
> http://tools.ietf.org/html/draft-livingood-dns-redirect-00, before
> the =??00 cutoff on Monday, and it will be discussed in the DNSOP WG
> meeting at IETF 75 (it is listed on the agenda).

I think that this sort of lying recursive resolver is a bad idea.
Instead, I suggest a new "SUGGESTION" RR type that could be returned
in the additional section of an error message.  For example, if
you ask for www.example.invalid, you could get back an NXDOMAIN
error, with "SUGGESTION URL=http://10.2.3.4/www.example.invalid";
in the additional section, and if you ask for censored.example.
you could get back a SERVFAIL response with "SUGGESTION
URL=http://10.2.3.4/why-we-censor.html"; in the additional section.

Clients who want to follow such suggestions can then do so, without
harming clients who don't want to be lied to.

--apb (Alan Barrett)
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop