Dear ADs,

this is a request to publish

        "Preventing Use of Recursive Nameservers in Reflector Attacks"
        draft-ietf-dnsop-reflectors-are-evil-04.txt

as a Best Current Practice RFC. This is a DNSOP work item.
Please find below the PROTO questionnaire.

Thanks,
  Peter

-----------------------------------------------------------------------------

(1.a)  Who is the Document Shepherd for this document?  Has the
       Document Shepherd personally reviewed this version of the
       document and, in particular, does he or she believe this
       version is ready for forwarding to the IESG for publication?

        Peter Koch (==me) is the Document Shepherd for this document.
        I have read the latest version (-04) of the draft and believe it
        is ready for consideration by the IESG.

(1.b)  Has the document had adequate review both from key WG members
       and from key non-WG members?  Does the Document Shepherd have
       any concerns about the depth or breadth of the reviews that
       have been performed?

        The draft has undergone in-depth review in the DNSOP WG and has
        been brought to the attention of various other DNS operational fora.

        Reviews are available from the DNSOP archive in response to the WGLC
        <http://www1.ietf.org/mail-archive/web/dnsop/current/msg04814.html>

        There are no concerns about the depth or breadth of reviews.

(1.c)  Does the Document Shepherd have concerns that the document
       needs more review from a particular or broader perspective,
       e.g., security, operational complexity, someone familiar with
       AAA, internationalization, or XML?

        There are no such concerns.

(1.d)  Does the Document Shepherd have any specific concerns or
       issues with this document that the Responsible Area Director
       and/or the IESG should be aware of?  For example, perhaps he
       or she is uncomfortable with certain parts of the document, or
       has concerns whether there really is a need for it.  In any
       event, if the WG has discussed those issues and has indicated
       that it still wishes to advance the document, detail those
       concerns here.  Has an IPR disclosure related to this document
       been filed?  If so, please include a reference to the
       disclosure and summarize the WG discussion and conclusion on
       this issue.

        There are no IPR or similar issues with this document.

(1.e)  How solid is the WG consensus behind this document?  Does it
       represent the strong concurrence of a few individuals, with
       others being silent, or does the WG as a whole understand and
       agree with it?

        The WG had good consensus in favour of the document, its intended
        status and the recommendations it makes.  Some WG members were
        uncomfortable with the focus being constrained to "recursive servers",
        leaving open the (ab)use of authoritative servers in similar or other
        attack scenarios.  Given the state of the art separation of
        recursive and authoritative name servers and the particular problem
        that triggered writing of this document, the WG supports this
        going forward knowing that it does not address all potential
        amplification issues caused by large DNS responses.

(1.f)  Has anyone threatened an appeal or otherwise indicated extreme
       discontent?  If so, please summarize the areas of conflict in
       separate email messages to the Responsible Area Director.  (It
       should be in a separate email because this questionnaire is
       entered into the ID Tracker.)

        The judgement made by the WG to address the specific attack
        scenario observed in early 2006 was not supported by all WG members
        (see separate note).

(1.g)  Has the Document Shepherd personally verified that the
       document satisfies all ID nits?  (See
       http://www.ietf.org/ID-Checklist.html and
       http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
       not enough; this check needs to be thorough.  Has the document
       met all formal review criteria it needs to, such as the MIB
       Doctor, media type, and URI type reviews?  If the document
       does not already indicate its intended status at the top of
       the first page, please indicate the intended status here.

        The draft has passed the ID nits test 2.04.12 at
        
<http://tools.ietf.org/wg/dnsop/draft-ietf-dnsop-reflectors-are-evil/draft-ietf-dnsop-reflectors-are-evil-04.nits.txt>.
        This document is aimed at BCP status.

(1.h)  Has the document split its references into normative and
       informative?  Are there normative references to documents that
       are not ready for advancement or are otherwise in an unclear
       state?  If such normative references exist, what is the
       strategy for their completion?  Are there normative references
       that are downward references, as described in [RFC3967]?  If
       so, list these downward references to support the Area
       Director in the Last Call procedure for them [RFC3967].

        The references are split into normative/informative and there
        are no downrefs.

(1.i)  Has the Document Shepherd verified that the document's IANA
       Considerations section exists and is consistent with the body
       of the document?  If the document specifies protocol
       extensions, are reservations requested in appropriate IANA
       registries?  Are the IANA registries clearly identified?  If
       the document creates a new registry, does it define the
       proposed initial contents of the registry and an allocation
       procedure for future registrations?  Does it suggest a
       reasonable name for the new registry?  See [RFC2434].  If the
       document describes an Expert Review process, has the Document
       Shepherd conferred with the Responsible Area Director so that
       the IESG can appoint the needed Expert during IESG Evaluation?

        The document does not require IANA action, which is what the IANA
        considerations section says.

(1.j)  Has the Document Shepherd verified that sections of the
       document that are written in a formal language, such as XML
       code, BNF rules, MIB definitions, etc., validate correctly in
       an automated checker?

        N/A

(1.k)  The IESG approval announcement includes a Document
       Announcement Write-Up.  Please provide such a Document
       Announcement Write-Up.  Recent examples can be found in the
       "Action" announcements for approved documents.  The approval
       announcement contains the following sections:

       Technical Summary
        This document describes ways to prevent the use of recursive
        nameservers as reflectors in Denial of Service (DoS) attacks.
        It makes recommendations to both operators and vendors (for
        default configurations).

       Working Group Summary
        The document was started in reaction to the "DNS reflection attacks"
        widely published in early 2006.  While the basic direction was
        clear from the beginning, it needed some discussion to agree upon
        a recommendation of the more sophisticated and less widely deployed
        querier authentication mechanisms (TSIG and SIG(0)).

       Document Quality
        After the February 2006 DNS amplification attacks, several surveys
        have discovered varying, but huge numbers of DNS resolvers on the
        Internet willing to respond to DNS queries of arbitrary origin.

        At least two vendors of DNS recursive servers (full resolvers)
        have announced to (or do already) follow the recommendations made
        in this document by adjusting their default ACLs.

       Personnel
        Peter Koch acted as the document shepherd.
        Ron Bonica reviewed this document for the IESG.

-----------------------------------------------------------------------------

_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to