Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-05 Thread Aaron Campbell
On 2013-09-05, at 4:25 PM, Florian Weimer wrote: > Exploiting this vulnerability successfully over the Internet against > resolvers processing real-world traffic still seems difficult to me, > at least if the resolver uses the Linux TCP/IP stack. This is not > completely idle speculation because

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-05 Thread Aaron Campbell
On 2013-09-05, at 10:02 PM, Haya Shulman wrote: > I would recommend short term patched (that we recommend in the paper) in the > meanwhile, and addressing the deployment challenges of DNSSEC. Some comments on these recommendations. Based on the caveats documented by Google, I'm not sure the r

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-07 Thread Aaron Campbell
On 2013-09-06, at 1:42 PM, Robert Edmonds wrote: > Aaron Campbell wrote: >> Here is a thought, but I will defer to the protocol experts on plausibility. >> The resolver knows the size of each DNS message it parses. What if it >> didn't trust glue records contained

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-08 Thread Aaron Campbell
On 2013-09-06, at 3:44 PM, Haya Shulman wrote: > We studied the IPID randomisation on the name servers (not the resolvers). > Only the name server side IPID randomisation is relevant to the attack, since > it is the response from the name server that the attacker attempts to alter > (by crafti

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-08 Thread Aaron Campbell
On 2013-09-07, at 4:11 PM, Paul Wouters wrote: >>> this sounds vaguely similar to unbound's "harden-referral-path" option, >>> though it applies to all lookups. >> >> I researched this, and found that it was first described here: >> >> http://tools.ietf.org/html/draft-wijngaards-dnsext-resolver

Re: [dns-operations] dns-operations Digest, Vol 92, Issue 13

2013-09-11 Thread Aaron Campbell
On 2013-09-11, at 2:30 AM, Paul Vixie wrote: > "A DNS UDP responder shall, when transmitting a message which does not > include embedded cryptographic marks such as TSIG or DNSSEC signatures, use > an effective DNS message payload size which is calculated as MIN(OFFERED, > MIN(DISCOVERED, ESTI

Re: [dns-operations] dns-operations Digest, Vol 92, Issue 13

2013-09-12 Thread Aaron Campbell
On 2013-09-11, at 11:50 PM, Paul Vixie wrote: >>> "A DNS UDP responder shall, when transmitting a message which does not >>> include embedded cryptographic marks such as TSIG or DNSSEC signatures, use >>> an effective DNS message payload size which is calculated as MIN(OFFERED, >>> MIN(DISCOVE