Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-06 Thread Daniel Kalchev
On 06.09.2013, at 10:49, Stephane Bortzmeyer wrote: > On Thu, Sep 05, 2013 at 02:54:18PM -0700, > Paul Vixie wrote > a message of 68 lines which said: > >> Florian Weimer wrote: >>> >>> Because DNSSEC does not prevent cache poisoning, it only detects it. >> >> i do not understand this statem

Re: [dns-operations] DNS Attack over UDP fragmentation

2013-09-06 Thread Daniel Kalchev
On 06.09.2013, at 17:30, Edward Lewis wrote: > On Sep 6, 2013, at 9:29, Daniel Kalchev wrote: > >> Or cache only after validation? > > > I shudder to think there's an alternative. If you are going to cache anyway, > don't waste your time validating. &

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-16 Thread Daniel Kalchev
On 14.10.13 19:08, Paul Hoffman wrote: A fictitious 100-person company has an IT staff of 2 who have average IT talents. They run some local servers, and they have adequate connectivity for the company's offices through an average large ISP. Should that company run its own recursive resolver

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-16 Thread Daniel Kalchev
On 14.10.13 21:46, Doug Barton wrote: We of the DNS literati tend to forget just how difficult this stuff really is, and how hard it is for companies to prioritize spending money on things that usually "just work." I can't count the number of times I got "emergency" calls when I was consult

Re: [dns-operations] Should medium-sized companies run their own recursive resolver?

2013-10-17 Thread Daniel Kalchev
On 17.10.13 00:12, Jared Mauch wrote: Even small networks (I have a friend with a ~100 user wisp) shouldn't run their own caches. The economics of it don't support this. Care to elaborate on this economic problem? Just an reference point: Most of today's smartphones already have more resour

Re: [dns-operations] summary of recent vulnerabilities in DNS security.

2013-10-21 Thread Daniel Kalchev
On 21.10.13 02:52, David Conrad wrote: On Oct 20, 2013, at 2:16 PM, Vernon Schryver wrote: Should the people working on DNS implementations prioritize making their DNSSEC code more robust and easier to use above or below addressing your issues? I'd say "below". Resolver operators (hopefully)

Re: [dns-operations] summary of recent vulnerabilities in DNS security.

2013-10-22 Thread Daniel Kalchev
On 22.10.13 12:50, Tony Finch wrote: Vernon Schryver wrote: Have you turned on DNSSEC where you can? If not, why not? Can we have less of the ad hominem please. I find these questions quite reasonable. When one claims "DNSSEC is difficult", while other claim it is not, then something i

Re: [dns-operations] summary of recent vulnerabilities in DNS security.

2013-10-23 Thread Daniel Kalchev
On 23.10.13 22:17, Haya Shulman wrote: Sorry for the brief description earlier, fyi, a slightly more elaborate design: The idea is to replace a single middle fragment, e.g., given n fragments, for n>2, we replace some fragment, s.t., 1< i < n. Assume n=3 (and also assume, for simplicity, that

Re: [dns-operations] summary of recent vulnerabilities in DNS security.

2013-10-26 Thread Daniel Kalchev
On 26.10.2013, at 12:37, Haya Shulman wrote: >> This is essentially an IP packet modification vulnerability and in order >> to do these, you don't even need fragmentation. This might happen even >> due to malfunctioning network adapter or other network device, not >> necessarily an "attack". One

Re: [dns-operations] summary of recent vulnerabilities in DNS security.

2013-10-29 Thread Daniel Kalchev
On 25.10.13 15:20, Stephane Bortzmeyer wrote: On Tue, Oct 22, 2013 at 11:59:04PM +, Vernon Schryver wrote a message of 50 lines which said: Why would there be extra support calls? Wrong keys are no worse than wrong delegations Of course, they are worse. In the vast majority of cases

Re: [dns-operations] All NSs for a TLD being in the TLD itself

2013-10-29 Thread Daniel Kalchev
On 29.10.13 13:31, Einar Lönn wrote: On Oct 29, 2013, at 10:24 AM, Calvin Browne wrote: I'm going to point out that .se went down because of a problem right at this point relativly recently. And .ng and I think there were more.. --Calvin No system is perfect until all human steps have

Re: [dns-operations] All NSs for a TLD being in the TLD itself

2013-10-29 Thread Daniel Kalchev
On 29.10.13 14:33, Einar Lönn wrote: On Oct 29, 2013, at 12:51 PM, Daniel Kalchev wrote: Furthermore this relatively tiny risk could be compared to the risk of a hijack of a name server residing out-of-zone which silently captures X percent of all your traffic. As you say you could consider

Re: [dns-operations] It's begun...

2013-11-14 Thread Daniel Kalchev
On 14.11.13 18:17, Peter Koch wrote: On Thu, Nov 14, 2013 at 03:35:24PM +, Dan York wrote: I wonder how much they will be able to sell "is.sexy" for? last time I looked, Iceland still existed. Was it not proven there is no problem... /s Daniel _

Re: [dns-operations] It's begun...

2013-11-14 Thread Daniel Kalchev
On 14.11.13 20:37, Dan York wrote: Of course, when it will get really interesting will probably be in January or so when General Availability hits for some of these and we start seeing what levels of interest there really is in all these newgTLDs. That will be the true test for all "Universa

Re: [dns-operations] Is it illegal to query the .berlin TLD servers?

2014-01-12 Thread Daniel Kalchev
Like, you might get arrested if you ever visit Germany... Or Berlin. Sent from my iPhone > On 10.01.2014, at 23:13, "william.ehgo...@bell.ca" > wrote: > > I'd like to see them enforce it when they are providing public, global > records. ;) > > -W. > --Original Message-- > From: Miek

Re: [dns-operations] AAAA record for c.root-servers.net

2014-04-21 Thread Daniel Kalchev
This is apparently an bug in the RIPE Atlas probe management software — it needs to make sure the probe can generally reach it’s own measurement targets, before assigning it to do any public IPv6 measurements. There are plenty of probes connected to misconfigured IPv6 networks all over the worl

Re: [dns-operations] AAAA record for c.root-servers.net

2014-04-24 Thread Daniel Kalchev
On 23.04.14 21:06, Stephane Bortzmeyer wrote: On Mon, Apr 21, 2014 at 10:33:42AM +0300, Daniel Kalchev wrote a message of 165 lines which said: This is apparently an bug in the RIPE Atlas probe management software — it needs to make sure the probe can generally reach it’s own measurement

Re: [dns-operations] Dumb question: why is it that some registries limit the nameservers that can be delegated to?

2014-09-12 Thread Daniel Kalchev
On 11.09.14 21:51, Colm MacCárthaigh wrote: > For example if a provider booted a box with an empty configuration, it > would be much better to timeout queries than respond with SERVFAIL or > REFUSED. The protocol expects and response from the server. If no response, the server is considered down

Re: [dns-operations] Dumb question: why is it that some registries limit the nameservers that can be delegated to?

2014-09-12 Thread Daniel Kalchev
On 12.09.14 04:24, Andrew Sullivan wrote: > On Thu, Sep 11, 2014 at 09:35:40PM -0300, Rubens Kuhl wrote: >> >> It was curious to see that a to-be-unnamed TLD registry, a newcomer >> to the scene many years after the holy wars that ended up defining >> the current RFCs, writing completely new code

Re: [dns-operations] Hearing first complains about failing internal resolving due to .prod TLD

2014-09-12 Thread Daniel Kalchev
On 12.09.14 05:47, Paul Vixie wrote: > in fairness, had we adopted the left-to-right presentation format > preferred at first by our UK colleagues, we would have always had to > write fully qualified names as .tld.sld.3ld, that is, the "root dot" > would not have been optional, and there would ha

Re: [dns-operations] Hearing first complains about failing internal resolving due to .prod TLD

2014-09-12 Thread Daniel Kalchev
On 12.09.14 07:35, Mark Andrews wrote: > > In message <541271ba.2000...@redbarn.org>, Paul Vixie writes: >> >> like i said this seems insane now. mark was right, we should have broken >> the bad stuff as early as possible. > > It isn't impossible. Emit warnings whenever a partially qualified >

Re: [dns-operations] Hearing first complains about failing internal resolving due to .prod TLD

2014-09-15 Thread Daniel Kalchev
On 13.09.14 17:54, Phillip Hallam-Baker wrote: > On Thu, Sep 11, 2014 at 9:12 PM, Paul Hoffman wrote: >> On Sep 11, 2014, at 4:27 PM, Paul Vixie wrote: >> >>> for the time being, and perhaps for a long time to come, the >>> people who call the presence of .PROD a bug and/or depend on its absenc

Re: [dns-operations] The Largest Cyber Attack In History Has Been Hitting Hong Kong Sites

2014-11-24 Thread Daniel Kalchev
>From the article: “There’s no technical solution that Cloudflare can create to solve this problem unless we re-architect the Internet.” I just love this kind of thinking! Daniel ___ dns-operations mailing list dns-operations@lists.dns-oarc.net https:/

Re: [dns-operations] thoughts on DNSSEC

2012-07-18 Thread Daniel Kalchev
Obviously, e-mail authentication is not appropriate, as is any in-band authentication as well. Proper DNSSEC implementations should use end-to-end electronic signatures. For example, while implementing DNSSEC back in 2007, we have made it mandatory in the BG registry to use qualified electroni

Re: [dns-operations] thoughts on DNSSEC

2012-07-18 Thread Daniel Kalchev
On 18.07.12 19:30, Vernon Schryver wrote: } From: Daniel Kalchev } Obviously, e-mail authentication is not appropriate, as is any in-band } authentication as well. It's not clear to me that e-mail authentication using something like https://www.ietf.org/id/draft-hoffman-dane-smime-0

Re: [dns-operations] keeping ICANN busy

2012-09-24 Thread Daniel Kalchev
On 23.09.12 03:53, Mark Andrews wrote: Just because the DNS software did not prevent A, and MX records being added does not mean that adding them was right. Wish DNS software prohibited at least A and records for any domain (zone), as opposed to "host" (this is largely indistinguis

Re: [dns-operations] dotless domains

2012-09-24 Thread Daniel Kalchev
On 21.09.12 19:02, Mike Jones wrote: If apple decide that they want to use "apple." for their main website then let them, it won't work, but it won't cause problems for anyone except themselves and their users. I would care less what it will cause to Apple and their users. That's Apple's ta

Re: [dns-operations] Summary: Anyone still using a Sun/Oracle SCA6000 with OpenSSL?

2012-10-16 Thread Daniel Kalchev
On Oct 15, 2012, at 12:41 AM, Richard Lamb wrote: > Why not the tpm migration method? I. E. > > > The receiving hsm produces the public half of a master storage key. > Then the starting hsm "authorizes" the key for use for exporting with pomp > and circumstance ;-) > Then the starting hsm e

Re: [dns-operations] Strange goings on with two domains

2012-10-22 Thread Daniel Kalchev
On 19.10.12 00:57, Andrew Sullivan wrote: When you delete names in EPP, you are not allowed to delete the name if any subordinate host objects still exist. You cannot delete a host object if there is something using that host object as a name server (the host is linked). Poor data model, th

Re: [dns-operations] email address in SOA

2012-12-06 Thread Daniel Kalchev
On 06.12.12 06:29, Phil Pennock wrote: Gmail offers what was, at the time they introduced it, an _unusual_ canonicalisation, which may have become more widespread now. It makes a lot of sense. Gmail says that, for mail to one of their domains, dots are not significant and canonicalise away. T

Re: [dns-operations] Capturing 8.8.8.8 Traffic

2013-02-26 Thread Daniel Kalchev
On 26.02.13 04:14, Warren Kumari wrote: Now I realize that lots of folk would prefer to believe that there is something more nefarious happening (and there is nothing really that I can say to change that) but I figured I should at least try explain why Google provides this... It is of cours

Re: [dns-operations] Another whitepaper on DDOS

2013-02-27 Thread Daniel Kalchev
Good example. I have argued for quite some time, that one of the DNSSEC primary benefits is to fight misconfigurations. With DNSSEC an misconfigured domain just "fails" instead of continuing to "work somehow". There are lots of misconfigured domains on the Internet and plenty clueless DNS admin

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Daniel Kalchev
On 22.08.13 22:59, wbr...@e1b.org wrote: From: Doug Barton As stated before, the problem is that after the "early adopter" period is over we'll be stuck with NTAs forever. This is one of those fundamental disagreements between those who believe that DNS should always be forgiving of operator er

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Daniel Kalchev
On 23.08.13 00:37, Joe Abley wrote: Last thing, we have NTAs today. People use them. Local policy always prevails. Even over common sense. We observe this in the real world, where local laws are always in force and in some places the local laws might not make sense to us, or even irritate o

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Daniel Kalchev
On 23.08.13 03:07, Vernon Schryver wrote: From: Suzanne Woolf I don't like it either, but it limits the damage done by a DNSSEC = failure to status quo ante rather than something worse. That is mistaken. You get the status quo ante by simply turning off validation. It seems, discussions li

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Daniel Kalchev
On 23.08.13 18:12, Warren Kumari wrote: On Aug 23, 2013, at 11:04 AM, "Carlos M. Martinez" wrote: I'm _very_ torn on the issue. On one hand I fully agree with Patrik in the sense that documenting such practices could lead to widespread 'holes' in validation. However, in my opinion the first

Re: [dns-operations] Implementation of negative trust anchors?

2013-08-23 Thread Daniel Kalchev
On 23.08.13 19:57, Ralf Weber wrote: Moin! On 23.08.2013, at 09:19, Paul Vixie wrote: if nasa.gov had screwed up its delegation or had allowed its public secondary servers to expire the zone due to primary unreachability, i do not think the phone at comcast would have rung less, but i also