FYI, I see I missed a number of typo's with 'ENDS'. This should read
instead 'EDNS'. It is fixed below.

                --Dean


On Mon, 24 Sep 2007, Dean Anderson wrote:

> I opposed this document in the DNSOP working group.  I have found some 
> additional reasons to oppose this document, in addition to the reasons I 
> gave to the DNSOP WG.  I generally agree with Stephen Hanna's findings.
> 
> I.   Harm only possible for EDNSO; Update RFC 2671 Instead
> II.  Authority Servers not Addressed, but Present More Harm
> III. Motivating Attacks Seem Contrived
> IV.  Ordinary DDOS Mitigation Appropriate for Reflector Case
> V.   Mitigation Options Limited in Authority Case
> VI.  Using "Evil" in a RFC Title is Unprofessional
> VII. Reflectors are Useful for Scientic Measurement
> VIII.Conclusion: Insufficient Harm to Justify Action
> 
> 
> I.   Harm only possible for EDNSO; Update RFC 2671 Instead
> 
> The maximum non-EDNS amplification factor is 8 (512 byte maximum
> response / 64 byte minimum query)  The non-EDNS attack has been possble 
> for over 20 years, but there have been no significant problems reported 
> in that time.  There is no reason to think the non-EDNS case presents 
> any problem, nor has that case ever presented a problem.
> 
> The significant harm posed by the attack described in this document is a 
> result of EDNS extensions which allow DNS servers to respond with upto 
> 8K byte long response to a relatively short EDNSO query.
> 
> The EDNSO extension considered some security vulnerabilies created by 
> the protocol extension. RFC 2671 states:
> 
> 6 - Security Considerations
> 
>      Requestor-side specification of the maximum buffer size may open a
>      new DNS denial of service attack if responders can be made to send
>      messages which are too large for intermediate gateways to forward,
>      thus leading to potential ICMP storms between gateways and
>      responders.
> 
> Security vulnerability of DDOS is nothing new for EDNSO.  Therefore at 
> most, this should be added as an addition to the security considerations 
> section in an update to RFC 2671.
> 
> II.   Authority Servers not Addressed, but Present More Harm
> 
> This document ignores the implications of these facts:
> 
> 1. Amplification does not require reflectors, but only requires servers
> with sufficiently large packets and high bandwidth capabilities.
> 
> 2. Authority servers are more difficult to block, since blocking
> authority servers results in a outage of DNS service for the zones
> served by that authority server.
> 
> III.  Motivating Attacks Seem Contrived
> 
> The motivating attacks also have a feature of being contrived examples.  
> In the actual attacks reported, serious forensics would lead to the
> identity of the attacker, making intelligent attackers avoid this
> attack. In the example widely discussed, the attacker obtained root
> access to a nameserver and hand-crafted an 8Kbyte EDNS record on the
> server.  The attacker then uses a group of computers to send EDNS query
> packets with false source address to 'reflector' nameservers, which sent
> the 8kbyte response to the spoofed source address.
> 
> Even though forensics would probably be able to identify the intruder to
> the original nameserver, in the motivating attack, the attack was not
> serious enough to merit law enforcement to conduct forensic analysis.
> 
> There have been no further similar attacks.
> 
> IV.  Ordinary DDOS Mitigation Appropriate for Reflector Case
> 
> Mitigation includes blocking the reflector nameservers with no harm to
> the target of the attack.  Mitigation can be done at any convenient
> point on the path between the reflector and the target.  One motivating 
> statement for the draft was that 'one cannot contact 20,000 server 
> operators to ask them to block the packets'. But that is not a 
> requirement for mitigation. Mitigation can be performed by ISPs in the 
> path, as is currently done for other types of DDOS attacks.
> 
> Because the mitigation options are the same as with any other spoofed
> DDOS attack, this attack does not merit special attention. And as the
> document states, if one can't send spoofed packets, one cannot conduct
> this attack at all.
> 
> V.   Mitigation Options Limited in Authority Case
> 
> By contrast with the open recursor case, one cannot easily mitigate an
> identical attack using legitimate authority nameservers serving
> legitimately large EDNS records.  Blocking all authority nameservers for
> a given zone disrupts DNS service between the DDOS target and the zones
> on the affected nameservers.  Examples of such servers include the Root
> DNS servers.  Blocking the Root DNS servers is at least as bad if not
> worse than the DDOS traffic.
> 
> This case is ignored.
> 
> VI.  Using "Evil" in a RFC Title is Unprofessional
> 
> The word "evil" in the name given to the draft and used in its title is
> also unprofessional, and doesn't belong in IETF documents. A search of 
> the RFC Index revealed no other similarly titled documents.
> 
> VII. Reflectors are Useful for Scientic Measurement
> 
> Last, the open recursor is a very useful scientific tool for analyzing
> the internet, and is used in a number of scientific papers: "King:
> Estimating Latency between Arbitrary Internet End Hosts"  by Gummadi,
> Saroiu, and Gribble
> (http://www.cs.washington.edu/~gribble/rw/papers/awards_assets/king.pdf)
> 
> The King method is cited in several scientific papers on Anycast:
> "A Measurement-based Deployment Proposal for IP Anycast", Ballani, 
> Francis, and Ratnasamy 
> http://pias.gforge.cis.cornell.edu/pub/anymeasure-imc-camera-final.pdf
> 
> Because the NSID draft (RFC 5001) makes it impossible to independently
> identify Anycast Root DNS server instances (because the returned nonce
> is encrypted and only decryptable by the root operators) and therefore
> impossible to measure the reliability of Anycast Root DNS services; the
> open recursor method is the only economical method to measure anycast
> services.  
> 
> VIII.Conclusion: Insufficient Harm to Justify Action
> 
> There is very little or no actual harm to having open DNS recursors, and
> a great deal of benefit.  DNS server operators should not be discouraged 
> from operating open recursors.
> 
> Dean Anderson
> Av8 Internet, Inc
> 
> 
> On Mon, 24 Sep 2007, Stephen Hanna wrote:
> 
> > I have reviewed this document as part of the security directorate's
> > ongoing effort to review all IETF documents being processed by the
> > IESG.  These comments were written primarily for the benefit of the
> > security area directors.  Document editors and WG chairs should treat
> > these comments just like any other last call comments.
> > 
> > DNS is not my area of expertise but the document clearly explains
> > the nature of the problem to be solved (DOS attacks that employ
> > DNS servers as amplifiers) and the recommendations for solving the
> > problem (employing ingress filtering to prevent IP address spoofing
> > and changing nameservers to provide recursive name lookup service
> > only to the intended clients).
> > 
> > I have no issue with the main content of the document. It does seem
> > like a worthwhile recommendation. However, I have a few comments.
> > 
> > The Introduction seems a bit defensive in stating that the DOS attacks
> > are not due to any flaw in the design of DNS or its implementations.
> > While the blame for the attacks lies with the attackers, some aspects
> > of nameserver configuration, behavior, and even protocol design make
> > the systems vulnerable to these attacks. I suggest that the defensive
> > language be removed.
> > 
> > Although I agree that ingress filtering is a good solution to this
> > problem and provides many other benefits since it addresses many
> > different attacks that involve spoofed IP addresses, the document
> > states repeatedly that ingress filtering is the only solution to
> > the problem. Ingress filtering may be the best solution but it is
> > NOT the only solution, as evidenced by the other measures described
> > in the document. None of these measures (including increased use
> > of ingress filtering) will provide complete and absolute protection
> > against DOS attacks that use nameservers as attack amplifiers.
> > Employing all of the measures as appropriate while emphasizing
> > the huge benefits of ingress filtering seems like the best approach.
> > So I suggest that the wording in the document be toned down to take
> > a more balanced approach to the problem.
> > 
> > Finally, I wonder whether other more fundamental techniques for
> > addressing the problem have been explored. For instance, if DNS clients
> > were required to perform a simple handshake before a DNS server sent
> > a long response, fake requests would provide little amplification.
> > For example, requests that elicit long responses could prompt a
> > shift to TCP. Of course, this would have other unpleasant side effects
> > such as slowing down the processing of DNS requests with long responses
> > and troubles getting DNS requests through firewalls. I'm not suggesting
> > that this approach be discussed in this document, simply that it be
> > considered (which probably has already been done).
> > 
> > Thanks,
> > 
> > Steve
> > 
> > _______________________________________________
> > Ietf mailing list
> > [EMAIL PROTECTED]
> > https://www1.ietf.org/mailman/listinfo/ietf
> > 
> > 
> 
> 

-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net         faster, more reliable, better service
617 344 9000   



_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to