Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-03-14 Thread teemu.savolainen
tf.org [mailto:dnsop-boun...@ietf.org] On Behalf Of > Savolainen Teemu (Nokia-MS/Tampere) > Sent: 19. tammikuuta 2011 11:12 > To: ted.le...@nominum.com > Cc: dnsop@ietf.org; carls...@workingcode.com; k...@syce.net > Subject: Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-19 Thread teemu.savolainen
Hi, > Your assertions about the state of the art in DNS resolver > implementations is probably correct. However, essentially what you > are proposing is to take this broken behavior as a standard, and then > build new functionality on it. The problem is that the behavior is Well, if the only

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread Ted Lemon
On Jan 17, 2011, at 9:34 AM, Nicholas Weaver wrote: > Why bother? IMO A better approach is NOT to try to patch DHCP/IPv6 Route > Advertisements/ARP etc, but just ACCEPT these as insecure. [1] Right, but people keep trying to treat them as if they conveyed some sort of trustworthiness. Hence

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread Nicholas Weaver
On Jan 17, 2011, at 6:25 AM, Ted Lemon wrote: > On Jan 17, 2011, at 9:22 AM, Andrew Sullivan wrote: >> (RFC 4035, section 4.9.3). Presumably, then, the stub needs somehow >> to have authenticated the DNS server in question otherwise before >> accepting the claims about signature validation. I c

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread Ted Lemon
On Jan 17, 2011, at 9:22 AM, Andrew Sullivan wrote: > (RFC 4035, section 4.9.3). Presumably, then, the stub needs somehow > to have authenticated the DNS server in question otherwise before > accepting the claims about signature validation. I can't think of any > way to do this under DHCP, but ma

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread Andrew Sullivan
On Mon, Jan 17, 2011 at 08:54:05AM -0500, Ted Lemon wrote: > Hm. Okay, so the reason this is an issue is that I'm assuming the > resolver doesn't do its own validation. And you're right that if it > doesn't do its own validation, it's not much worse off using this > option than not using it; th

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread Ted Lemon
On Jan 17, 2011, at 5:29 AM, wrote: > This option directs a host to ask question from some of the servers it could > have anyway send its question to. How DNSSEC cannot manage to secure DNS > queries in that case? Your assertions about the state of the art in DNS resolver implementations is pr

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread Andrew Sullivan
On Mon, Jan 17, 2011 at 10:29:45AM +, teemu.savolai...@nokia.com wrote: > That particular case I have been told is protected against by using DNSSEC, > which ensures the host will detect the fraudulent answer to this directed > attack and will fall back to use other DNS server (or fail)... >

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread teemu.savolainen
> A rogue DHCPv6 server can add entries to that file, but can't delete > them. Thus, it's possible for a bad DHCPv6 server to make life > annoying for a client, but (at least for DNS) it can't prevent the client from > eventually working. The rogue DHCPv6 server can insert its DNS server as the p

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread teemu.savolainen
the interface this attacker has control over. Teemu > -Original Message- > From: dnsop-boun...@ietf.org [mailto:dnsop-boun...@ietf.org] On Behalf > Of ext Andrew Sullivan > Sent: 14. tammikuuta 2011 18:01 > To: dnsop@ietf.org > Subject: Re: [DNSOP] draft-savolainen-mif-dn

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-17 Thread teemu.savolainen
ubject: Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt > > On Jan 14, 2011, at 10:53 AM, wrote: > > If I now have e.g. multihomed Linux, often or usually the > /etc/resolv.conf points to the DNS server address learned most recently > via some mean (RA, DHCPv6). Bu

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Andrew Sullivan
On Fri, Jan 14, 2011 at 04:01:35PM +, teemu.savolai...@nokia.com wrote: > > E.g. by definition. Implement this only if you are a CPE or if you > are 3GPP handset and then only for this class of interface. Or > such. Those two scenarios are my main focus. Not believe what > CoffeeShopFreeAP tel

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread James Carlson
teemu.savolai...@nokia.com wrote: > I have to admit one thing I have not really understood is why the level of > concern here is so deep. > > If I now have e.g. multihomed Linux, often or usually the /etc/resolv.conf > points to the DNS server address learned most recently via some mean (RA, >

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread teemu.savolainen
> > You can ignore the option and talk to the DNS server of your > preference. You can also choose to listen for the option only from one > or more trusted sources. > > > > I'm really unclear about this "trusted sources" thing, though. Is > that "trust only if you're on a trusted network"? Becau

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Andrew Sullivan
On Fri, Jan 14, 2011 at 03:53:25PM +, teemu.savolai...@nokia.com wrote: > > Shouldn't we work e.g. on securing all DHCPv6 signaling? I would say so, yes. But note that this particular option makes it easier to target one domain in particular. That's a more directed attack, so it seems to me

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Ted Lemon
On Jan 14, 2011, at 10:53 AM, wrote: > If I now have e.g. multihomed Linux, often or usually the /etc/resolv.conf > points to the DNS server address learned most recently via some mean (RA, > DHCPv6). But people are not too worried what is the content of that file? > I.e. attacker could just se

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread teemu.savolainen
ilto:ted.le...@nominum.com] > Sent: 14. tammikuuta 2011 17:13 > To: Savolainen Teemu (Nokia-MS/Tampere) > Cc: carls...@workingcode.com; dnsop@ietf.org; k...@syce.net > Subject: Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt > > On Jan 14, 2011, at 9:58 AM, wrote: > > Lac

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Andrew Sullivan
On Fri, Jan 14, 2011 at 03:09:21PM +, teemu.savolai...@nokia.com wrote: > > You can ignore the option and talk to the DNS server of your preference. You > can also choose to listen for the option only from one or more trusted > sources. > I'm really unclear about this "trusted sources" thi

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Ted Lemon
On Jan 14, 2011, at 9:58 AM, wrote: > Lack of trust on information contained in all options? Right. Generally, we assume that the higher-level protocol will have some sort of security mechanism--e.g., DNSSEC. Or we assume that the environment in which DHCP is being done is one in which ther

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread teemu.savolainen
> To put it another way, if I hear through this new mechanism that some > DNS server will handle requests for "example.com.", that does *NOT* > imply in any way that I want bare names to be resolved by that server > preferentially. Perhaps I do -- but perhaps I don't. That's what the > search lis

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread teemu.savolainen
t > Subject: Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt > > On Jan 14, 2011, at 9:28 AM, > wrote: > > This is a generic feature of DHCPv6, right? > > What is? ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Ted Lemon
On Jan 14, 2011, at 9:28 AM, wrote: > This is a generic feature of DHCPv6, right? What is? ___ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread teemu.savolainen
Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt > > On Jan 14, 2011, at 9:00 AM, James Carlson wrote: > > Or should the resolver somehow "know" whether the DHCPv6 information > is > > "secure," for whatever "secure" means? And how would it

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread Ted Lemon
On Jan 14, 2011, at 9:00 AM, James Carlson wrote: > Or should the resolver somehow "know" whether the DHCPv6 information is > "secure," for whatever "secure" means? And how would it know that the > information is as valid as the DNSSEC information? This is, of course, the key problem. The resol

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread James Carlson
On 01/14/11 07:06, teemu.savolai...@nokia.com wrote: >> The two seem quite distinct to me. The existing search list option >> provides a global setting for the client, and is intended to affect how >> unqualified (or partially-qualified) names are resolved. > > Right, but the same information c

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-14 Thread teemu.savolainen
Hi, > -Original Message- > From: ext James Carlson [mailto:carls...@workingcode.com] > Sent: 13. tammikuuta 2011 17:53 > To: Savolainen Teemu (Nokia-MS/Tampere) > Cc: k...@syce.net; dnsop@ietf.org > Subject: Re: draft-savolainen-mif-dns-server-selection-06.txt > > > My thinking evolved fr

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-13 Thread James Carlson
teemu.savolai...@nokia.com wrote: > Hi James, > > My thinking evolved from DNS search list option defined in RFC3646, hence > using DHCPv6 seemed like a logical choice. The two seem quite distinct to me. The existing search list option provides a global setting for the client, and is intended t

Re: [DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-13 Thread teemu.savolainen
Hi James, My thinking evolved from DNS search list option defined in RFC3646, hence using DHCPv6 seemed like a logical choice. Additionally collecting information required for multi-homing configuration into one place (DHCPv6) seemed useful: this option, DHCPv6 Route Option (draft-ietf-mif-dhc

[DNSOP] draft-savolainen-mif-dns-server-selection-06.txt

2011-01-11 Thread James Carlson
I read this draft with some interest, as I've run into this sort of problem many times myself. I'm curious, though, about the architectural implications of the described design. In particular, the use of DHCPv6 to convey suffix/prefix information means that the DHCP server needs to be updated as