Re: [DNSOP] SEA DNS w DNSSEC Hack thought...

2013-08-28 Thread Andreas Schulze
Zitat von Nicholas Weaver : One thought on DNSSEC and this (nytimes.com) attack. Nickolas, your suggestion try to solve the problem by inspecting common behaviour. What about providing a policy statement? I imagine an extension, where the subdomain declares an explicit statement to the TL

Re: [DNSOP] SEA DNS w DNSSEC Hack thought...

2013-08-28 Thread Nicholas Weaver
On Aug 28, 2013, at 8:37 AM, Paul Wouters wrote: ... > Sounds like certificate pinning or CT-DNSSEC. It has the same problems. > There will be more false positives then actual attacks, and people will > disable it. Of course, that argument also says "Ditch DNSSEC altogether, bypass the recurs

[DNSOP] SEA DNS w DNSSEC Hack thought...

2013-08-28 Thread Nicholas Weaver
One thought on DNSSEC and this attack. DNSSEC couldn't have prevented this attack, as anyone authorized to update the .com zone for a domain can update the DS records just as easily as the NS+glue records. And the attack could have done orders of magnitude more damage. Yet DNSSEC can create a

Re: [DNSOP] SEA DNS w DNSSEC Hack thought...

2013-08-28 Thread Paul Wouters
On Wed, 28 Aug 2013, Nicholas Weaver wrote: How does the following policy strike people for DNSSEC recursive resolvers which perform validation: Keep all seen DS and PARENT NS+glue RRSETs in a much-longer-than-normal (2 day timeout) cache. When the DS or parent NS+glue RRSET changes, record

Re: [DNSOP] wouldn't it be nice if there was an automatic mechanism to help with this?

2013-08-28 Thread Hosnieh
It can provide that as well if you configure your DNS server with a list of authorized IP addresses for certain zones. In other words, you let your DNS server know from which IP addresses it can accept updates for a particular zone. In this case, CGA-TSIG can be helpful,as well, as it can provide t

Re: [DNSOP] wouldn't it be nice if there was an automatic mechanism to help with this?

2013-08-28 Thread Guangqing Deng
Usually, DNSSEC can stop cache poisoning attack. And for such event where the Resource Records are wrongly updated, maybe the method provided by draft-jabley-dnsop-dns-flush-00 is useful to flush the bad resource records on recursive DNS servers. Guangqing Deng CNNIC From: Hosnieh Date: 20

Re: [DNSOP] wouldn't it be nice if there was an automatic mechanism to help with this?

2013-08-28 Thread Guangqing Deng
Cga-tsig approach can make sure that the content transferred between resolvers and DNS servers is not maliciously modified by others; while this approach cannot prevent the Resource Record (RR) from being wrongly updated by the registrar (namely man-made mistakes). Then it seems that one kind of

Re: [DNSOP] wouldn't it be nice if there was an automatic mechanism to help with this?

2013-08-28 Thread Hosnieh
Follow up, If you have a secure mechanism that does not allow attackers to do cache poisioning on the client's stub resolver, then this solve the problem of malicious websites as well. Best, Hosnieh___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.

Re: [DNSOP] wouldn't it be nice if there was an automatic mechanism to help with this?

2013-08-28 Thread Hosnieh
I think this problem has a solution in IPv6, but I am not sure for IPv4. The current draft, cga-tsig proposed to automate the process of authentication of resolvers (DNS query resolution) and DNS servers (DNS update) in a secure manner. You can take a look on that draft. Best, Hosnieh > On August