Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Livingood, Jason
Just back from vacation and see an amazing 87 messages in this thread on NTAs. As the primary NTA I-D author and NTA proponent I will slowly make my way through. Regards Jason ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://li

[dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
Hi all, for all those who haven't been on saag WG at IETF 88... Amir Herzbert and Haya Shulman has presented a quite interesting attack on UDP fragmentation that allows Kaminsky-style attacks to be real again. The saag presentation is here: http://www.ietf.org/proceedings/87/slides/slides-87-s

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Livingood, Jason
On 8/23/13 12:52 PM, "Daniel Kalchev" wrote: >Most ISP's DNS "operations" are just as clueless/careless as those >breaking their DNS setups. NTAs are not solutions for these, because >they won't bother with it either. It's fun to poke at operators I guess, and that's certainly one reason why mor

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Livingood, Jason
On 8/26/13 2:16 AM, "Randy Bush" mailto:ra...@psg.com>> wrote: fix the software and the ops processes. do not patch over the problems or they will increase. the problem is weak software and processes that need to be fixed, and patching and denial will not fix them. Fair enough, and I agree tha

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Yasuhiro Orange Morishita / 森下泰宏
Hello, I believe that it is another serious attack against DNS protocol, or it may be against UDP/IP (especially IPv4). So, we might set max-udp-size to 1220 for preventing UDP fragmentation. And I know anouther "IPv6 Fragment Header Deprecated" I-D at IETF 6man WG. BTW, sometimes I unofficial

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Stephane Bortzmeyer
On Wed, Sep 04, 2013 at 03:08:55PM +0200, Ondřej Surý wrote a message of 81 lines which said: > So what are the views of other people on this list? [Total noob just going back from holidays and therefore even less competent as usual.] Isn't is a good idea to limit the maximum size of the res

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Jim Reid
On 4 Sep 2013, at 15:04, Ondřej Surý wrote: >> A possible solution is simply to deploy IPv6 faster :-) > Yeah :), but what should we do in the eternity meanwhile? Don't fragment at all, set TC=1 on responses which would cause UDP or lower layer fragmantation and assume only genuine queries wi

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Yasuhiro Orange Morishita / 森下泰宏
Hello, > > So, we might set max-udp-size to 1220 for preventing UDP > > fragmentation. > > But, in IPv4, the attacker can send spoofed ICMP "packet too big" > messages to decrease the size of the path MTU, as seen by the DNS > server. RELNOTES of NSD 3.2.9 describes the following, we may separ

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
On 4. 9. 2013, at 16:11, Jim Reid wrote: > > On 4 Sep 2013, at 15:04, Ondřej Surý wrote: > >>> A possible solution is simply to deploy IPv6 faster :-) > >> Yeah :), but what should we do in the eternity meanwhile? > > Don't fragment at all, set TC=1 on responses which would cause UDP or low

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
On 4. 9. 2013, at 15:47, Stephane Bortzmeyer wrote: > On Wed, Sep 04, 2013 at 03:08:55PM +0200, > Ondřej Surý wrote > a message of 81 lines which said: > >> So what are the views of other people on this list? > > [Total noob just going back from holidays and therefore even less > competent a

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread WBrown
Ondřej Surý wrote on 09/04/2013 10:37:57 AM: > On 22. 8. 2013, at 21:59, wbr...@e1b.org wrote: > > Our browsers give us the option to trust invalid TLS certificates, some > > even storing it indefinitely. Is an NTA much different? > > > And in certain circles it's considered by one of the bi

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread kato
Folks, A few years ago, I had an informal conversation with Dr. Vixie, and he mentioned he could work a little bit more on DNS level fragmentation (protocol modification required, however). At a glance, we may use EDNS0 variable part to represent DNS level fragmentation information as well as add

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Dan York
Ondrej, On 9/4/13 9:08 AM, "Ondřej Surý" wrote: >We gave it some thoughts here at CZ.NIC Labs and we think that the threat >is real and we are now trying to write a PoC code to prove the >theoretical concept. > >So what are the views of other people on this list? I attended the SAAG session, li

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Ondřej Surý
On 22. 8. 2013, at 21:59, wbr...@e1b.org wrote: > Our browsers give us the option to trust invalid TLS certificates, some > even storing it indefinitely. Is an NTA much different? And in certain circles it's considered by one of the biggest mistakes that could have happened, and the reason why

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
BTW just to complete my question in first email - is there a agreement that this is serious and needs to be addressed? I am still wondering why this have slipped under the radar for so long (the original paper was published last year). Ondřej Surý > On 4. 9. 2013, at 15:47, Stephane Bortzmeyer

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Jim Reid
On 4 Sep 2013, at 15:34, Stephane Bortzmeyer wrote: >> Don't fragment at all, set TC=1 on responses which would cause UDP >> or lower layer fragmantation > > Not obvious to implement, the application (the name server) typically > does not know the path MTU before sending an UDP packet to a > de

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Jim Reid
On 4 Sep 2013, at 15:40, Ondřej Surý wrote: >> Check also ICMP "packet too big" coming in with ridiculous sizes, they >> might be the sign that someone is trying the Shulman attack. > > True, but again, that might work for us, but not for average DNS operator. Indeed. But who is more likely to

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Livingood, Jason
Last but not least, I observed some conflicting feedback in this thread on NTAs. So I am wondering whether there is comparatively more consensus on these two issues: 1 – Responsibility for authoritative DNSSEC mistakes rests with authoritative operators (written up quickly in http://tools.ietf

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
> Check also ICMP "packet too big" coming in with ridiculous sizes, they > might be the sign that someone is trying the Shulman attack. JFTR It's one ICMP packet per the fragmentation cache timeout and the unique destination IP. I wish we had found out some way to enforce BCP38 before spoofing

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Jelte Jansen
On 09/04/2013 04:50 PM, Ondřej Surý wrote: > BTW just to complete my question in first email - is there a agreement that > this is serious and needs to be addressed? > Just had a quick read and here are some random thoughts (staying out of solution space for now): Fragmentation has long been k

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
> On 4. 9. 2013, at 16:50, Jim Reid wrote: > > On 4 Sep 2013, at 15:40, Ondřej Surý wrote: > >>> Check also ICMP "packet too big" coming in with ridiculous sizes, they >>> might be the sign that someone is trying the Shulman attack. >> >> True, but again, that might work for us, but not for a

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Colm MacCárthaigh
I don't think there's any requirement to fragment exactly at the MTU/MSS boundary. It's ok to fragment at a lower point, so there's an opportunity for additional entropy by randomising the point of fragmentation on a datagram by datagram basis. If the spoofer doesn't know the point of fragmentation

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Stephane Bortzmeyer
On Wed, Sep 04, 2013 at 04:04:13PM +0200, Ondřej Surý wrote a message of 93 lines which said: > > Isn't is a good idea to limit the maximum size of the response, > > like .com/.net (and may be other TLD: examples welcome) do? This > > will make the attack more difficult. > > That could work,

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Stephane Bortzmeyer
On Wed, Sep 04, 2013 at 11:01:43PM +0900, Yasuhiro Orange Morishita / 森下泰宏 wrote a message of 40 lines which said: > RELNOTES of NSD 3.2.9 describes the following, > we may separate max-udp-size value for IPv4 and for IPv6. This controls the size of the IP datagrame sent by the application (t

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Stephane Bortzmeyer
On Wed, Sep 04, 2013 at 03:11:17PM +0100, Jim Reid wrote a message of 11 lines which said: > Don't fragment at all, set TC=1 on responses which would cause UDP > or lower layer fragmantation Not obvious to implement, the application (the name server) typically does not know the path MTU befo

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Mike Hoskins (michoski)
-Original Message- From: Dan York Date: Wednesday, September 4, 2013 11:03 AM To: Ondřej Surý , DNS Operations Subject: Re: [dns-operations] DNS Attack over UDP fragmentation >Ondrej, > >On 9/4/13 9:08 AM, "Ondřej Surý" wrote: > >>We gave it some thoughts here at CZ.NIC Labs and we thi

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Stephane Bortzmeyer
On Wed, Sep 04, 2013 at 10:45:42PM +0900, Yasuhiro Orange Morishita / 森下泰宏 wrote a message of 38 lines which said: > So, we might set max-udp-size to 1220 for preventing UDP > fragmentation. But, in IPv4, the attacker can send spoofed ICMP "packet too big" messages to decrease the size of t

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Ondřej Surý
On 4. 9. 2013, at 16:33, Stephane Bortzmeyer wrote: > On Wed, Sep 04, 2013 at 04:04:13PM +0200, > Ondřej Surý wrote > a message of 93 lines which said: > >>> Isn't is a good idea to limit the maximum size of the response, >>> like .com/.net (and may be other TLD: examples welcome) do? This >>

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread ondrej . sury
On 2013-09-04 17:25, Colm MacCárthaigh wrote: I don't think there's any requirement to fragment exactly at the MTU/MSS boundary. It's ok to fragment at a lower point, so there's an opportunity for additional entropy by randomising the point of fragmentation on a datagram by datagram basis. If the

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread ondrej . sury
On 2013-09-04 17:38, Mike Hoskins (michoski) wrote: -Original Message- From: Dan York Date: Wednesday, September 4, 2013 11:03 AM To: Ondřej Surý , DNS Operations Subject: Re: [dns-operations] DNS Attack over UDP fragmentation Ondrej, On 9/4/13 9:08 AM, "Ondřej Surý" wrote: We gav

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Mike Hoskins (michoski)
-Original Message- From: Ondřej Surý Date: Wednesday, September 4, 2013 10:37 AM To: "wbr...@e1b.org" Cc: "dns-operati...@dns-oarc.net" Subject: Re: [dns-operations] Implementation of negative trust anchors? >On 22. 8. 2013, at 21:59, wbr...@e1b.org wrote: >> Our browsers give us the o

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Jaroslav Benkovský
On 09/04/2013 05:48 PM, Francis Dupont wrote: > In your previous mail you wrote: > >> When these are defined, implemented, and deployed, all DNS messages >> can be sent with DF=1 or IPv6 fragmentation option can be >> deprecated. > > => if I remember well the attack is for IPv4 (it exchanges

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Paul Vixie
how much more money, brains, and time are we going to collectively waste on dns (so, a WOMBAT) to solve the problems dnssec solves, rather than just deploying dnssec? i understood why, during the 2008 summer of fear, we had to focus our efforts on source port randomization. but it's 2013 now. unles

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Francis Dupont
In your previous mail you wrote: > When these are defined, implemented, and deployed, all DNS messages > can be sent with DF=1 or IPv6 fragmentation option can be > deprecated. => if I remember well the attack is for IPv4 (it exchanges the random DNS ID and port against the random IP ID which

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Colm MacCárthaigh
On Wed, Sep 4, 2013 at 8:40 AM, wrote: > >> It'd be interesting to work out what the total entropy is by >> using that along with truly random IP IDs. >> > > It's only 16-bit and it's not much since you can preload the second > fragments even before the query is sent. I think with variable poin

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread ondrej . sury
On 2013-09-04 17:55, Mike Hoskins (michoski) wrote: -Original Message- From: Ondřej Surý Date: Wednesday, September 4, 2013 10:37 AM To: "wbr...@e1b.org" Cc: "dns-operati...@dns-oarc.net" Subject: Re: [dns-operations] Implementation of negative trust anchors? On 22. 8. 2013, at 21:5

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Mike Hoskins (michoski)
-Original Message- From: "ondrej.s...@nic.cz" Date: Wednesday, September 4, 2013 12:37 PM To: "dns-operations@lists.dns-oarc.net" Subject: Re: [dns-operations] Implementation of negative trust anchors? >>When the two seem to conflict, better education is the answer not >> removing one's

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread ondrej . sury
On 2013-09-04 18:12, Paul Vixie wrote: how much more money, brains, and time are we going to collectively waste on dns (so, a WOMBAT) to solve the problems dnssec solves, rather than just deploying dnssec? i understood why, during the 2008 summer of fear, we had to focus our efforts on source

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Dan York
Paul, On 9/4/13 12:12 PM, "Paul Vixie" wrote: >how much more money, brains, and time are we going to collectively waste >on dns (so, a WOMBAT) to solve the problems dnssec solves, rather than >just deploying dnssec? My interest in understanding this attack is to understand how severe it may be

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Paul Vixie
ondrej.s...@nic.cz wrote: > On 2013-09-04 18:12, Paul Vixie wrote: >> ..., then i think we can safely tell anyone who is worried that their >> authority data or recursive server is vulnerable to fragmentation-based >> attacks, that they ought to just deploy dnssec. > > Paul, > > the problem is th

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread WBrown
From: "Livingood, Jason" > 1 ? Responsibility for authoritative DNSSEC mistakes rests with > authoritative operators > (written up quickly in http://tools.ietf.org/html/draft-livingood- > auth-dnssec-mistakes-00) The ultimate responsibility for domain issues really rests with the domain owner,

Re: [dns-operations] Implementation of negative trust anchors?

2013-09-04 Thread Edward Lewis
> I don't think this is about a free choice, but adhering to the protocol. At this point, I'm not sure who is saying what and what is inferred in the quips, but if you adhere to the protocol, you place free choice first. This is not just from my dimming memory of the 1990's when we developed t

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Francis Dupont
In your previous mail you wrote: > Read the paper, the authors mention that the recommendation for IP-ID on > IPv6 is a sequential value, so its entropy is meager at best. Also some > implementations on IPv4 use sequential value or per destination counters. => my comment was about correct IPv

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-04 Thread Randy Bush
> if you want to spend time on solutions for A/Z where A cares about > security and Z does not, that's your decision. but A is a vulnerable player ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https://lists.dns-oarc.net/mailman/listin