>>>>> "Dean" == Dean Anderson <[EMAIL PROTECTED]> writes:

    >> The fact that something else is a *bigger* risk, doesn't have
    >> any bearing on whether the first thing is a risk.

    Dean> Yes, it really does.  Especially if the bad guy doesn't have
    Dean> to even change his source code to get more bang for his
    Dean> botnet, and doesn't incur any more risk.  In fact, using
    Dean> authority servers is _less_ risk to the abuser, because to
    Dean> compose the reflector attacks, s/he has to crack into a
    Dean> server, craft a record, and search 3.7 million IP addresses
    Dean> for a list of reflectors. All of these things leave a
    Dean> forensic trail. Any one of which might lead back to the bad
    Dean> guy.

    Dean> By contrast, searching authority servers for, say, large SPF
    Dean> records isn't suspicious. There is no trail besides the
    Dean> botnet, which is necessary for either case. Authority
    Dean> servers give more bang and less risk, and same code and
    Dean> payload size. One must presume the attacker a complete idiot
    Dean> to make the open reflectors attack look attractive.

I have to agree with Dean on the specific point that analyzing related
risks to determine whether one problem is worth fixing is actually
important in doing security work.  Fixing a problem has a cost--both
in implementation and inconvenience.  If other related risks reduce
the value of that fix,then the cost may not be justified.

So, to the extent that Dean is trying to encourage that sort of
analysis here, I think it is very good.

At this time, I make no comment on the rest of his message or on
whether his technical analysis of this issue is in fact correct.

Sam Hartman
Security Area Director

_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to