On Mar 8, 2007, at 10:30 AM, Dean Anderson wrote:

   3.1) draft-ietf-dnsop-reflectors-are-evil-03.txt
        [Joao/Fred][10 min][17:50]
        post WGLC discussion -- ready for the IESG?

This draft falsely claims that the amplification potential is greatly reduced when authoritative servers are used:

 DNS authoritative servers which do not provide recursion to clients
 can also be used as amplifiers; however, the amplification potential
 is greatly reduced when authoritative servers are used.

The amplification potential to authoritative servers is exactly the same as for recursive servers, and the attack volume depends only on the bandwidth available to the nameserver and the number of queries sent. No evidence was given to show that there is any difference between authoritative servers and recursive servers. Scanning the internet for recursive nameservers is as difficult or more difficult than scanning for authoritative nameservers for large records. Further, no scanning is necessary at all if one uses the root servers to conduct this attack, since the root servers IP addresses are known, and there is no mitigation.

The higher gain attacks leverage a large RR not normally found in most authoritative DNS. An exception might be wildcard RRs that do not accommodate maximal label sizes. While indeed this may be the case for many SPF RRs, the scripts contained in SPF actually represent a far greater attack threat. These attack levels start at the highest gain achieved by an open recursive DNS. SPF scripts could be used to reference 10 additional SPF RRs, or hundreds of A records when used in conjunction with spamming. The SPF related attack does not not expend additional resources of the attacker beyond the initial queries and can target any other victim as well. This script may then repeat for every domain being validated, which will soon include DKIM domains. Perhaps another draft should be titled, SPF-scripts-are-evil. : o

Recursive servers can be easily located without any scanning and then asked to obtain an answer referencing problematic RRs (which may be poorly considered SPF RRs). Your point about scanning is misleading, as there are many ways to determine their location. Preventing access to recursive servers significantly reduces the possible sources relied upon by a distributed mode of attack. Most mobile users are granted both their IP address and DNS, where limiting access will not represent any hardship. Those working on wireless connections in a public setting might even consider tunneling their DNS requests and endure added latencies over improved security.

-Doug



_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to