I'd like to direct a question to the chairs - would you summarize the
open IESG discuss issues with the current document? In this mail
I'll allude to some of what I guess are the open discuss items.
Looking at the tracker there are discusses against -04 and a note
that a new version is needed. We have a -05 now, I suppose that
qualifies as the new version.
Even though I am not an enthusiast of the notion that the attacks
reported in spring 2006 incriminate open recursive resolvers, I think
the draft should be published as it is and that we free this mailing
list of any more arguments on the topic.
The document only recommends that name server code should be shipped
with the open recursive configuration in the "off" position. It does
not say that operating an open recursive resolver is evil, despite
the the file name.
Recommending that an operator attempt to scope the source of requests
is harmless to those that want a wide open scope. A recommendation
of a scooping based on source IP address is not a client
authentication vulnerability (as in it is trivial to spoof the source
field of UDP) but is a reflection or a widely followed practice in
operations. Regardless of the IETF's notion of security, operators
have their own rules of thumb and source IP address ACLs are part of
that.
I can live with the details of the attacks, perhaps some find the
prose confusing and I am sympathetic to calls to shore it up. But I
think that it really isn't crucial as the recommendations section is
quite distinct from it.
There is one line in the -05 which I find to be the "meat."
"By default, nameservers SHOULD NOT offer recursive service to
external networks."
Note the "by default." If that were not present, I would object to
the document. To me, the statement is safe because there is no
penalty to operating in any manner that is not the "default" way. No
justification is needed to diverge from "default." So saying that
the default is to not be an open recursive server is acceptable to me.
PS - The other comment in the discuss items - removing the
possibility of amplification. That can be done, but the cure is
worse than the disease. We can expand all queries to be the maximum
acceptable response size (512 or to the size indicated via EDNS0)
with padding of the queries. That removes the incentive to use the
recursive server as a reflector because you can then just have the
botnet directly target the victim, probably with more aggregate
bandwidth. (Botnets could do that now, hit a victim with overstuffed
DNS queries or falsified answers for that matter, thanks to UDP's
fire and forget paradigm.) For legitimate DNS, it would be a
bandwidth waste.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis +1-571-434-5468
NeuStar
Think glocally. Act confused.
_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop