Re: DNS hardening, was Re: Dan Kaminsky

2009-08-10 Thread Douglas Otis
This was responded to on the DNSEXT mailing list. Sorry, but your question was accidentally attributed to Paul who forwarded the message. DNSEXT Archive: http://ops.ietf.org/lists/namedroppers/ -Doug

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-07 Thread Steven M. Bellovin
On Thu, 06 Aug 2009 06:51:24 + Paul Vixie wrote: > Christopher Morrow writes: > > > how does SCTP ensure against spoofed or reflected attacks? > > there is no server side protocol control block required in SCTP. > someone sends you a "create association" request, you send back a > "ok, her

Re: Dan Kaminsky

2009-08-07 Thread Jorge Amodio
>> doesn't the iphone has an app to decode qr-codes similar to the one >> built into almost all keitai here in japan. >> >>     http://en.wikipedia.org/wiki/QR_Code > > Yep.  Called iMatrix.  (There are probably others too) Yes, that's one of the apps. Anyway, as you can see this is just one exam

Re: Dan Kaminsky

2009-08-07 Thread Jorge Amodio
>> Have you seen the iphone decoding bar code into urls ? > > doesn't the iphone has an app to decode qr-codes similar to the one > built into almost all keitai here in japan. Yes, is not really new but it can decode QR, DataMatrix (same as used for postage), ShotCode and bar code. With the new ca

QR-Codes... was: Re: Dan Kaminsky

2009-08-07 Thread Dragos Ruiu
On 7-Aug-09, at 8:01 PM, Randy Bush wrote: Have you seen the iphone decoding bar code into urls ? doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan. http://en.wikipedia.org/wiki/QR_Code There are multiple (5+ at last count) iP

RE: Dan Kaminsky

2009-08-07 Thread Buhrmaster, Gary
> doesn't the iphone has an app to decode qr-codes similar to the one > built into almost all keitai here in japan. > > http://en.wikipedia.org/wiki/QR_Code Yep. Called iMatrix. (There are probably others too)

Re: Dan Kaminsky

2009-08-07 Thread Randy Bush
> Have you seen the iphone decoding bar code into urls ? doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan. http://en.wikipedia.org/wiki/QR_Code randy

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-07 Thread Ben Scott
On Thu, Aug 6, 2009 at 6:06 AM, Alexander Harrowell wrote: > 1) Authenticate the nameserver to the client (and so on up the chain to the > root) in order to defeat the Kaminsky attack, man in the middle, IP-layer > interference. (Are you who you say you are?) DNSSEC fans will be quick to point o

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Christopher Morrow
On Thu, Aug 6, 2009 at 11:16 AM, Paul Vixie wrote: > note, i went off-topic in my previous note, and i'll be answering florian > on namedroppers@ since it's not operational.  chris's note was operational: > >> Date: Thu, 6 Aug 2009 10:18:11 -0400 >> From: Christopher Morrow >> >> awesome, how does

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Ross Vandegrift
On Thu, Aug 06, 2009 at 03:16:25PM +, Paul Vixie wrote: > > ...: "Do loadbalancers, or loadbalanced deployments, deal with this > > properly?" (loadbalancers like F5, citrix, radware, cisco, etc...) > > as far as i know, no loadbalancer understands SCTP today. if they can be > made to pass SC

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Paul Vixie
note, i went off-topic in my previous note, and i'll be answering florian on namedroppers@ since it's not operational. chris's note was operational: > Date: Thu, 6 Aug 2009 10:18:11 -0400 > From: Christopher Morrow > > awesome, how does that work with devices in the f-root-anycast design? > (bo

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Douglas Otis
On 8/5/09 7:05 PM, Naveen Nathan wrote: On Wed, Aug 05, 2009 at 09:17:01PM -0400, John R. Levine wrote: ... It seems to me that the situation is no worse than DNSSEC, since in both cases the software at each hop needs to be aware of the security stuff, or you fall back to plain unsigned DNS.

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Christopher Morrow
On Thu, Aug 6, 2009 at 2:51 AM, Paul Vixie wrote: > Christopher Morrow writes: > >> how does SCTP ensure against spoofed or reflected attacks? > > there is no server side protocol control block required in SCTP.  someone > sends you a "create association" request, you send back a "ok, here's your

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Tony Finch
On Wed, 5 Aug 2009, Naveen Nathan wrote: > > I might misunderstand how dnscurve works, but it appears that dnscurve > is far easier to deploy and get running. Not really. There are multiple competing mature implementations of DNSSEC and you won't be in a network of 1 if you deploy it. Tony. -- f

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Alexander Harrowell
There are really two security problems here, which implies that two different methods might be necessary: 1) Authenticate the nameserver to the client (and so on up the chain to the root) in order to defeat the Kaminsky attack, man in the middle, IP-layer interference. (Are you who you say you

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Paul Jakma
On Thu, 6 Aug 2009, Florian Weimer wrote: This doesn't seem possible with current SCTP because the heartbeat rate quickly adds up and overloads servers further upstream. It also does not work on UNIX-like system where processes are short-lived and get a fresh stub resolver each time they are

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Naveen Nathan: > I'll assume the cipher used for the lasting secret keys is interchangeable. Last time I checked, even the current cryptographic algorithms weren't specified. It's unlikely that there is an upgrade path (other than stuffing yet another magic label into your name server names).

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* John Levine: > 3) Random case in queries, e.g. GooGLe.CoM This does not work well without additional changes because google.com can be spoofed with responses to 123352123.com (or even 123352123.). Unbound strives to implement the necessary changes, some of which are also required if you want t

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Paul Vixie: > there is no server side protocol control block required in SCTP. SCTP needs per-peer state for congestion control and retransmission. > someone sends you a "create association" request, you send back a > "ok, here's your cookie" and you're done until/unless they come back > and s

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Douglas Otis: > DNSSEC UDP will likely become problematic. This might be due to > reflected attacks, SCTP does not stop reflective attacks at the DNS level. To deal with this issue, you need DNSSEC's denial of existence. The DNSSEC specs currently doesn't allow you to stop these attacks dead

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Douglas Otis: > Establishing SCTP as a preferred DNS transport offers a safe harbor > for major ISPs. SCTP is not a suitable transport for DNS, for several reasons: Existing SCTP stacks are not particularly robust (far less than TCP). The number of bugs still found in them is rather large. On

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Paul Vixie
Christopher Morrow writes: > how does SCTP ensure against spoofed or reflected attacks? there is no server side protocol control block required in SCTP. someone sends you a "create association" request, you send back a "ok, here's your cookie" and you're done until/unless they come back and say

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Naveen Nathan
Ben, Thanks for the cogent comparison between the two security systems for DNS. > DNSCurve requires more CPU power on nameservers (for the more > extensive crypto); DNSSEC requires more memory (for the additional > DNSSEC payload). This is only true for the initial (Elliptic Curve) Diffie-Hell

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 10:05 PM, Naveen Nathan wrote: > I might misunderstand how dnscurve works, but it appears that dnscurve > is far easier to deploy and get running. My understanding: They really do different things. They also have different behaviors. DNSCurve aims to secure the tran

RE: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Skywing
ng time as far as I can tell. - S -Original Message- From: Naveen Nathan [mailto:nav...@calpop.com] Sent: Wednesday, August 05, 2009 7:05 PM To: John R. Levine Cc: nanog@nanog.org Subject: Re: dnscurve and DNS hardening, was Re: Dan Kaminsky On Wed, Aug 05, 2009 at 09:17:01PM -0400, John

Re: Dan Kaminsky

2009-08-05 Thread Mark Andrews
> -- Ben @ 209.85.221.52 Really? farside.isc.org:marka {2} % telnet 209.85.221.52 25 Trying 209.85.221.52... Connected to mail-qy0-f52.google.com. Escape character is '^]'. 220 mx.google.com ESMTP 26si8920387qyk.119 helo farside.isc.org 250 mx.google.com at your service mail from: 250 2.1.0 OK

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Naveen Nathan
On Wed, Aug 05, 2009 at 09:17:01PM -0400, John R. Levine wrote: > ... > > It seems to me that the situation is no worse than DNSSEC, since in both > cases the software at each hop needs to be aware of the security stuff, or > you fall back to plain unsigned DNS. I might misunderstand how dnscurv

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Christopher Morrow
On Wed, Aug 5, 2009 at 6:53 PM, Douglas Otis wrote: > On 8/5/09 2:49 PM, Christopher Morrow wrote: >> >> and state-management seems like it won't be too much of a problem on >> that dns server... wait, yes it will. > > DNSSEC UDP will likely become problematic.  This might be due to reflected > att

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Mark Andrews
In message , "John R. Levine" writes: > >>> http://dnscurve.org/crypto.html, which is always brought up, but > >>> never seems to solve the problems mentioned. > > > As I understand it, dnscurve protects transmissions, not objects. > > That's not the way DNS operates today, what with N levels of

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 8:40 PM, James R. Cutler wrote: >>> (2) Saying "type our name into $SERVICE", where $SERVICE is some >>> popular website that most people trust (like Facebook or whatever), >>> and has come up with a workable system for disambiguation. > > I can only hope that those who belie

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John R. Levine
http://dnscurve.org/crypto.html, which is always brought up, but never seems to solve the problems mentioned. As I understand it, dnscurve protects transmissions, not objects. That's not the way DNS operates today, what with N levels of cache. It may or may not be better, but it's a much bigge

Re: Dan Kaminsky

2009-08-05 Thread James R. Cutler
(2) Saying "type our name into $SERVICE", where $SERVICE is some popular website that most people trust (like Facebook or whatever), and has come up with a workable system for disambiguation. I can only hope that those who believe in "disambiguation" of mailing addresses, electronic or otherw

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 7:30 PM, Mark Andrews wrote: >        Which requires that people type addresses in in the first >        place. As I wrote, we're already part of the way towards people not having to do even that. >        No they make finding a unique id easy by leveraging a >        ex

Re: Dan Kaminsky

2009-08-05 Thread Mark Andrews
In message <59f980d60908051602y1fe364devfb5f590a8c795...@mail.gmail.com>, Ben S cott writes: > On Wed, Aug 5, 2009 at 6:37 PM, Chris Adams wrote: > >>> ... we may not longer have the end user =93typing=94 a URL, the DNS or > >>> something similar will still be in the background providing name to a

Re: Dan Kaminsky

2009-08-05 Thread Joe Greco
> (2) Saying "type our name into $SERVICE", where $SERVICE is some > popular website that most people trust (like Facebook or whatever), > and has come up with a workable system for disambiguation. You might want to talk to AOL about that. ... JG -- Joe Greco - sol.net Network Services - Milwauk

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
>  I think it would be nice if we had some nicely designed, elegant, > centralized protocol to do all this, but I suspect that won't happen. s/centralized/distributed/ > them on their iPhone via some other damn thing.  Yes, it'll be a mess. Have you seen the iphone decoding bar code into urls ?

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 7:06 PM, Jorge Amodio wrote: > Talking about the subject with a friend during the past few days, most of > the conversation ended being around the User Interface. A popular idiom is "where the rubber meets the road". It comes from cars, of course. The contact patch betwe

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
>> At some time in the future and when a new paradigm for the user interface is >> conceived, we may not longer have the end user “typing” a URL, the DNS or >> something similar will still be in the background providing name to address >> mapping but there will be no more monetary value associated

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 6:37 PM, Chris Adams wrote: >>> ... we may not longer have the end user “typing” a URL, the DNS or >>> something similar will still be in the background providing name to address >>> mapping ... >> >>   In the the vast majority of cases I have seen, people don't type >> doma

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 2:49 PM, Christopher Morrow wrote: and state-management seems like it won't be too much of a problem on that dns server... wait, yes it will. DNSSEC UDP will likely become problematic. This might be due to reflected attacks, fragmentation related congestion, or packet loss. When it

Re: Dan Kaminsky

2009-08-05 Thread Chris Adams
Once upon a time, Ben Scott said: > In the the vast majority of cases I have seen, people don't type > domain names, they search the web. When they do type a domain name, > they usually type it into the Google search box. Web != Internet. DNS is used for much more than web sites, and many of

Re: Dan Kaminsky

2009-08-05 Thread Marshall Eubanks
On Aug 5, 2009, at 6:26 PM, Ben Scott wrote: On Wed, Aug 5, 2009 at 12:49 PM, Jorge Amodio wrote: At some time in the future and when a new paradigm for the user interface is conceived, we may not longer have the end user “typing” a URL, the DNS or something similar will still be in the b

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 12:49 PM, Jorge Amodio wrote: > At some time in the future and when a new paradigm for the user interface is > conceived, we may not longer have the end user “typing” a URL, the DNS or > something similar will still be in the background providing name to address > mapping bu

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Steven M. Bellovin
On Wed, 5 Aug 2009 15:07:30 -0400 (EDT) "John R. Levine" wrote: > >> 5 is 'edns ping', but it was effectively blocked because people > >> thought DNSSEC would be easier to do, or demanded that EDNS PING > >> (http://edns-ping.org) would offer everything that DNSSEC offered. > > > > I'm surpri

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Christopher Morrow
On Wed, Aug 5, 2009 at 5:24 PM, Douglas Otis wrote: > On 8/5/09 11:31 AM, Roland Dobbins wrote: >> >> On Aug 6, 2009, at 1:12 AM, Douglas Otis wrote: >> >>> Having major providers support the SCTP option will mitigate disruptions >>> caused by DNS DDoS attacks using less resources. >> >> Can you el

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 11:31 AM, Roland Dobbins wrote: On Aug 6, 2009, at 1:12 AM, Douglas Otis wrote: Having major providers support the SCTP option will mitigate disruptions caused by DNS DDoS attacks using less resources. Can you elaborate on this (or are you referring to removing the spoofing vecto

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
> Read "Patterns in Network Architecture" by John Day. "A Return to Fundamentals", great book. "the Internet today is more like DOS, but what we need should be more like Unix" Great thing he didn't say Windows :-) Cheers

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 11:38 AM, Skywing wrote: That is, of course, assuming that SCTP implementations someday clean up their act a bit. I'm not so sure I'd suggest that they're really ready for "prime time" at this point. SCTP DNS would be intended for ISPs validating DNS where there would be fewer iss

Re: Dan Kaminsky

2009-08-05 Thread Scott Weeks
--- jmamo...@gmail.com wrote: From: Jorge Amodio Sooner or later, we or the new generation of ietfers and nanogers, will need to start thinking about a new naming paradigm and design the services and protocols associated with it. The key question is, when we start?

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John R. Levine
3 works, but offers zero protection against 'kaminsky spoofing the root' since you can't fold the case of "123456789.". And the root is the goal. Good point. 5) Download your own copy of the root zone every few days from http://www.internic.net/domain/, check the signature if you can find the

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John R. Levine
5 is 'edns ping', but it was effectively blocked because people thought DNSSEC would be easier to do, or demanded that EDNS PING (http://edns-ping.org) would offer everything that DNSSEC offered. I'm surprised you failed to mention http://dnscurve.org/crypto.html, which is always

RE: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Skywing
o: John Levine Cc: nanog@nanog.org Subject: Re: DNS hardening, was Re: Dan Kaminsky On 8/5/09 9:48 AM, John Levine wrote: > Other than DNSSEC, I'm aware of these relatively simple hacks to add > entropy to DNS queries. > > 1) Random query ID > > 2) Random source port >

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Roland Dobbins
On Aug 6, 2009, at 1:12 AM, Douglas Otis wrote: Having major providers support the SCTP option will mitigate disruptions caused by DNS DDoS attacks using less resources. Can you elaborate on this (or are you referring to removing the spoofing vector?)? ---

Re: Dan Kaminsky

2009-08-05 Thread Marshall Eubanks
On Aug 5, 2009, at 1:30 PM, Jorge Amodio wrote: It may sound too futuristic and inspired from science fiction, but I never saw Captain Piccard typing a URL on the Enterprise. That's ok, I've never seen the Enterprise at the airport. Go to Dulles Airport. She used to be on the runwa

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 9:48 AM, John Levine wrote: Other than DNSSEC, I'm aware of these relatively simple hacks to add entropy to DNS queries. 1) Random query ID 2) Random source port 3) Random case in queries, e.g. GooGLe.CoM 4) Ask twice (with different values for the first three hacks) and compare the

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Phil Regnauld
bert hubert (bert.hubert) writes: > > 5 is 'edns ping', but it was effectively blocked because people > thought DNSSEC would be easier to do, or demanded that EDNS PING > (http://edns-ping.org) would offer everything that DNSSEC offered. I'm surprised you failed to mention http://dnscurve

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
>>       That's ok, I've never seen the Enterprise at the airport. > > I have, but not that Enterprise (I saw the space shuttle orbiter > Enterprise on a 747 land here). There is one docked at Pier 26 in New York City :-)

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
>> It may sound too futuristic and inspired from science fiction, but I never >> saw >> Captain Piccard typing a URL on the Enterprise. > >        That's ok, I've never seen the Enterprise at the airport. Don't confuse sight with vision. >> Sooner or later, we or the new generation of ietfers an

Re: Dan Kaminsky

2009-08-05 Thread Chris Adams
Once upon a time, Phil Regnauld said: > Jorge Amodio (jmamodio) writes: > > It may sound too futuristic and inspired from science fiction, but I never > > saw > > Captain Piccard typing a URL on the Enterprise. > > That's ok, I've never seen the Enterprise at the airport. I have, but not

Re: Dan Kaminsky

2009-08-05 Thread Phil Regnauld
Jorge Amodio (jmamodio) writes: > > It may sound too futuristic and inspired from science fiction, but I never saw > Captain Piccard typing a URL on the Enterprise. That's ok, I've never seen the Enterprise at the airport. > Sooner or later, we or the new generation of ietfers and nanoge

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread bert hubert
On Wed, Aug 5, 2009 at 6:48 PM, John Levine wrote: > 3) Random case in queries, e.g. GooGLe.CoM > 4) Ask twice (with different values for the first three hacks) and > compare the answers > > I presume everyone is doing the first two.  Any experience with the > other two to report? 3 works, but off

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
> My interest was in replacing the protocol.  I've grown fond of the > name space, for all of its warts. As we evolved from circuit switching to packet switching, which many at the time said it would never work, and from the HOSTS.TXT to DNS, sooner or later the “naming scheme” for resources on th

DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John Levine
Other than DNSSEC, I'm aware of these relatively simple hacks to add entropy to DNS queries. 1) Random query ID 2) Random source port 3) Random case in queries, e.g. GooGLe.CoM 4) Ask twice (with different values for the first three hacks) and compare the answers I presume everyone is doing th

Re: Dan Kaminsky

2009-08-05 Thread Leo Bicknell
In a message written on Wed, Aug 05, 2009 at 02:32:27PM +, Florian Weimer wrote: > The transport protocol is a separate issue. It is feasible to change > it, but the IETF has a special working group which is currently tasked > to prevent any such changes. My interest was in replacing the pro

Re: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Roland Dobbins
On Aug 5, 2009, at 10:20 PM, Erik Soosalu wrote: Multiple systems end up with problems. Yes, and again, I'm not advocating this approach. I just think it's most likely where we're going to end up, long-term. --- Roland D

Re: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Roland Dobbins
On Aug 5, 2009, at 10:11 PM, Mark Andrews wrote: For all it's short comings the DNS and the single namespace it brings is much better than having a multitude of namespaces. I agree with you, but I don't think this approach is going to persist as the standard model. Increasingly, trans

RE: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Erik Soosalu
[mailto:rdobb...@arbor.net] Sent: Wednesday, August 05, 2009 10:44 AM To: NANOG list Subject: DNS alternatives (was Re: Dan Kaminsky) On Aug 5, 2009, at 9:32 PM, Florian Weimer wrote: > We might have an alternative one day, but it's going to happen by > accident, through generaliz

Re: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Mark Andrews
In message <825c8ac7-c01e-4934-92fd-e7b9e8091...@arbor.net>, Roland Dobbins wri tes: > > On Aug 5, 2009, at 9:32 PM, Florian Weimer wrote: > > > We might have an alternative one day, but it's going to happen by > > accident, through generalization of an internal naming service > > employed b

DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Roland Dobbins
On Aug 5, 2009, at 9:32 PM, Florian Weimer wrote: We might have an alternative one day, but it's going to happen by accident, through generalization of an internal naming service employed by a widely-used application. Or even more likely, IMHO, that more and more applications will have t

Re: Dan Kaminsky

2009-08-05 Thread Nick Hilliard
On 05/08/2009 15:18, Leo Bicknell wrote: > I don't understand why replacing DNS is "not feasible". I'd be happy to think about replacing the DNS as soon as we've finished off migrating to an ipv6-only internet in a year or two. Shall we set up a committee to try to make it happen faster? Nick

Re: Dan Kaminsky

2009-08-05 Thread Florian Weimer
* Leo Bicknell: > In a message written on Tue, Aug 04, 2009 at 11:32:46AM -0700, Kevin Oberman > wrote: >> There is NO fix. There never will be as the problem is architectural >> to the most fundamental operation of DNS. Other than replacing DNS (not >> feasible), the only way to prevent this for

Re: Dan Kaminsky

2009-08-05 Thread Leo Bicknell
In a message written on Tue, Aug 04, 2009 at 11:32:46AM -0700, Kevin Oberman wrote: > There is NO fix. There never will be as the problem is architectural > to the most fundamental operation of DNS. Other than replacing DNS (not > feasible), the only way to prevent this form of attack is DNSSEC. T

Re: Dan Kaminsky

2009-08-04 Thread bert hubert
On Tue, Aug 4, 2009 at 9:25 PM, Paul Vixie wrote: > i didn't pay any special heed to it since there was no way to get enough > bites at the apple due to negative caching. when i saw djb's announcement > (i think in 1999 or 2000, so, seven years after schuba's paper came out) i > said, geez, that's

Re: Dan Kaminsky

2009-08-04 Thread Dragos Ruiu
On 3-Aug-09, at 9:43 PM, andrew.wallace wrote: Hi, Read my post one more time and think though: Only "zf0" are legally in the shit. The guy "Dragos Ruiu" has absolutely no case against me. Copy & paste doesn't count as defamation, speak to Wired's legal team if you have an issue. Cheers,

Re: Dan Kaminsky

2009-08-04 Thread Paul Vixie
Curtis Maurand writes: >> What does this have to do with Nanog, the guy found a critical >> security bug on DNS last year. > > He didn't find it. He only publicized it. the guy who wrote djbdns fount > it years ago. first blood on both the DNS TXID attack, and on what we now call the Kashpuref

Re: Dan Kaminsky

2009-08-04 Thread Patrick W. Gilmore
There is NO fix. There never will be as the problem is architectural to the most fundamental operation of DNS. Other than replacing DNS (not feasible), the only way to prevent this form of attack is DNSSEC. The "fix" only makes it much harder to exploit. Randomizing source ports and QIDs simp

Re: Dan Kaminsky

2009-08-04 Thread Kevin Oberman
> Date: Tue, 04 Aug 2009 13:32:42 -0400 > From: Curtis Maurand > > andrew.wallace wrote: > > On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiu wrote: > > > >> at the risk of adding to the metadiscussion. what does any of this have to > >> do with nanog? > >> (sorry I'm kinda irritable about charac

Re: Dan Kaminsky

2009-08-04 Thread Mikael Abrahamsson
On Tue, 4 Aug 2009, valdis.kletni...@vt.edu wrote: Yes, but a wise man without a PR agent doesn't do the *rest* of the community much good. A Morris or Bernstein may *see* the problem a decade before, but it may take a Mitnick or Kaminsky to make the *rest* of us able to see it... Same thin

Re: Dan Kaminsky

2009-08-04 Thread Valdis . Kletnieks
On Tue, 04 Aug 2009 13:32:42 EDT, Curtis Maurand said: > > What does this have to do with Nanog, the guy found a critical > > security bug on DNS last year. > > > He didn't find it. He only publicized it. the guy who wrote djbdns > fount it years ago. Powerdns was patched for the flaw a yea

Re: Dan Kaminsky

2009-08-04 Thread Curtis Maurand
andrew.wallace wrote: On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiu wrote: at the risk of adding to the metadiscussion. what does any of this have to do with nanog? (sorry I'm kinda irritable about character slander being spammed out unnecessarily to unrelated public lists lately ;-P )

Re: Dan Kaminsky

2009-08-03 Thread andrew.wallace
Hi, Read my post one more time and think though: Only "zf0" are legally in the shit. The guy "Dragos Ruiu" has absolutely no case against me. Copy & paste doesn't count as defamation, speak to Wired's legal team if you have an issue. Cheers, Andrew On Tue, Aug 4, 2009 at 2:02 AM, Richard A St

Re: Dan Kaminsky

2009-08-03 Thread Cord MacLeod
Read my post one more time... The standards you described are what I described. No video, no audio = no speech = no slander. The article was written, hence libel. On Aug 3, 2009, at 6:02 PM, Richard A Steenbergen wrote: On Sat, Aug 01, 2009 at 01:11:17PM -0700, Cord MacLeod wrote: I do

Re: Dan Kaminsky

2009-08-03 Thread Richard A Steenbergen
On Sat, Aug 01, 2009 at 01:11:17PM -0700, Cord MacLeod wrote: > I don't see a video attached or an audio recording. Thus no slander. > > Libel on the other hand is a different matter. You have those backwards. Slander is transitory (i.e. spoken) defamation, libel is written/recorded/etc non-tran

Re: Dan Kaminsky

2009-08-01 Thread Cord MacLeod
I don't see a video attached or an audio recording. Thus no slander. Libel on the other hand is a different matter. On Aug 1, 2009, at 8:10 AM, andrew.wallace wrote: On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiu wrote: at the risk of adding to the metadiscussion. what does any of this have

Re: Dan Kaminsky

2009-08-01 Thread andrew.wallace
On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiu wrote: > at the risk of adding to the metadiscussion. what does any of this have to > do with nanog? > (sorry I'm kinda irritable about character slander being spammed out > unnecessarily to unrelated public lists lately ;-P ) > What does this have to

Re: Dan Kaminsky

2009-07-30 Thread Richard A Steenbergen
On Thu, Jul 30, 2009 at 03:48:18PM -0700, Dragos Ruiu wrote: > > On 29-Jul-09, at 9:23 PM, Randy Bush wrote: > > >Ettore Bugatti, maker of the finest cars of his day, was once asked > >why > >his cars had less than perfect brakes. He replied something like, > >"Any > >fool can make a car sto

Re: Dan Kaminsky

2009-07-30 Thread Dragos Ruiu
On 29-Jul-09, at 9:23 PM, Randy Bush wrote: LAS VEGAS — Two noted security professionals were targeted this week by hackers who broke into their web pages, stole personal data and posted it online on the eve of the Black Hat security conference. boring. Two noted security professionals,

Re: Dan Kaminsky

2009-07-29 Thread andrew.wallace
--- On Wed, 7/29/09, Scott Weeks wrote: > From: Scott Weeks > Subject: Re: Fwd: Dan Kaminsky > To: "andrew.wallace" > Date: Wednesday, July 29, 2009, 10:10 PM > > > --- andrew.wall...@rocketmail.com > wrote: > > http://www.leetupload.com/zf05.txt > -- > >