Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-29 Thread Mark Andrews
ther than switching them to TCP (which happens without cookies). Once Alice has a server cookie then the the server skips all the rate limiting on future transactions from Alice (but not the attacker) until the server cookie times out / is forgotten. Mark > Best, > Hosnieh > &g

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-29 Thread Hosnieh Rafiee
From: DNSOP [mailto:dnsop-boun...@ietf.org] On Behalf Of Mark Andrews > Sent: Tuesday, July 21, 2015 7:19 AM > Cc: DNSOP@ietf.org; Hosnieh Rafiee > Subject: Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies > > > Hosnieh, below is a real life use of cookies showing how they

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-22 Thread Donald Eastlake
Hi Hosnieh, On Mon, Jul 20, 2015 at 10:55 AM, Hosnieh Rafiee wrote: >> > This is not highlighted in the draft which makes it confusing for the >> > reader which causes to raise such question regarding NAT. >> >> Because it is irrelevent has to how the attacker chooses the address to >> attack. >

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Mark Andrews
Hosnieh, below is a real life use of cookies showing how they are used. Establish a cookie pair. Dig chooses a random value for the client cookie. The server returns the client cookie along with the server cookie. The client cookie is checked and as it matched "good" is displayed. ; <<>> DiG

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Mark Andrews
In message <024401d0c2fc$2cc85ce0$865916a0$@rozanak.com>, "Hosnieh Rafiee" writ es: > > > This is not highlighted in the draft which makes it confusing for the > > > reader which causes to raise such question regarding NAT. > > > > Because it is irrelevent has to how the attacker chooses the addr

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Hosnieh Rafiee
> -Original Message- > From: DNSOP [mailto:dnsop-boun...@ietf.org] On Behalf Of Donald Eastlake > > Hi Ralf, > > On Mon, Jul 20, 2015 at 7:19 AM, Ralf Weber wrote: > > Moin! > > > > While the protocol is designed so that no state needs to be maintained at the > server, I don't think th

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Donald Eastlake
Hi Ralf, On Mon, Jul 20, 2015 at 7:19 AM, Ralf Weber wrote: > Moin! > > On 20 Jul 2015, at 4:39, Mark Andrews wrote: >> No. The server takes the fake_client_cookie + IP client (victim) + >> server secret + maybe parts of server cookie itself. Computes a >> server cookie and compares that with wh

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Hosnieh Rafiee
Hi Donald, I think all the things you mentioned already addressed in other messages. So, I would only go to the part that is not already answered > > It seems to me that presenting the defenses before the attacks means that > while you are reading the defenses they are un-motivated. I think the

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Hosnieh Rafiee
> > This is not highlighted in the draft which makes it confusing for the > > reader which causes to raise such question regarding NAT. > > Because it is irrelevent has to how the attacker chooses the address to attack. > What is relevent is the impact the attack is happening and how a server can

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Mark Andrews
In message <3c8b970b-4588-4f31-ab35-436b7cbb5...@fl1ger.de>, "Ralf Weber" write s: > Moin! > > On 20 Jul 2015, at 4:39, Mark Andrews wrote: > > No. The server takes the fake_client_cookie + IP client (victim) + > > server secret + maybe parts of server cookie itself. Computes a > > server cookie

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Ralf Weber
Moin! On 20 Jul 2015, at 4:39, Mark Andrews wrote: > No. The server takes the fake_client_cookie + IP client (victim) + > server secret + maybe parts of server cookie itself. Computes a > server cookie and compares that with what was received. If and > only if that matches (1 in 2^64) does the f

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-20 Thread Donald Eastlake
Hi, I think Mark has done a good job in responding, so I don't really have much to add. If you can conveniently do configuration at the client and server, then you can get strong authentication with TSIG. If you can't, the weak authentication provided by Cookies is about the best you can do. See

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Mark Andrews
In message <001201d0c288$317fe330$947fa990$@rozanak.com>, "Hosnieh Rafiee" writes: > > > When the clients are not seen, I just wonder how the attacker can > > > target them?? > > > > Clients talks to things other than DNS servers. The attacker gets the > address of > > the address of the client

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Hosnieh Rafiee
> > When the clients are not seen, I just wonder how the attacker can > > target them?? > > Clients talks to things other than DNS servers. The attacker gets the address of > the address of the client from those transactions. This is not highlighted in the draft which makes it confusing for the

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Mark Andrews
In message <01d0c225$8c4d0260$a4e70720$@rozanak.com>, "Hosnieh Rafiee" writes: > > > So, you want such mechanism is implemented in NAT devices to protect > > > all clients in that network, right? If not, the implementation of that > > > in a single client behind the NAT, doesn't help all the

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Hosnieh Rafiee
> > So, you want such mechanism is implemented in NAT devices to protect > > all clients in that network, right? If not, the implementation of that > > in a single client behind the NAT, doesn't help all the clients inside > > that NAT network because the target is a public address of this device >

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-19 Thread Mark Andrews
In message <001501d0c1ec$52898050$f79c80f0$@rozanak.com>, "Hosnieh Rafiee" writes: > Mark, > > Thanks for your explanation. My comments are inline... > > > -Original Message- > > From: DNSOP [mailto:dnsop-boun...@ietf.org] On Behalf Of Mark Andrews > > > > > If the victim node is behi

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-18 Thread Hosnieh Rafiee
Mark, Thanks for your explanation. My comments are inline... > -Original Message- > From: DNSOP [mailto:dnsop-boun...@ietf.org] On Behalf Of Mark Andrews > > If the victim node is behind NAT (servers are not behind NAT), and > > attacker is not in the same network, IMO, it cannot perfor

Re: [DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-18 Thread Mark Andrews
In message <000301d0c17f$6ac5f530$4051df90$@rozanak.com>, "Hosnieh Rafiee" writes: > > Hello, > > I have reviewed this draft. My comments are as followings: > > - Section 3.2 TKEY can solve the problem .. > IMO TKEY also needs some manual preconfiguration on the server side. So, it > does no

[DNSOP] Review of draft: draft-ietf-dnsop-cookies

2015-07-18 Thread Hosnieh Rafiee
Hello, I have reviewed this draft. My comments are as followings: - Section 3.2 TKEY can solve the problem .. IMO TKEY also needs some manual preconfiguration on the server side. So, it does not completely solve the TKEY distribution problem. furthermore This is only applicable to recursive re