Folks,
Someone on DNSOPS points out that I am calendar challenged. September 5
has already past. I meant to say Friday, September 12.
Ron
Ron Bonica wrote:
> Dean,
>
> On the surface, I deem your objection to be without merit. Unless you
> can convince me otherwise, I will send
> draft-ietf-dnsop-reflectors-are-evil to the RFC editor for publication
> on Friday, September 5. See below for point by point responses.
>
> Dean Anderson wrote:
>> Anytime you discover that the facts asserted and relied on for a
>> document are false, or the sources of those facts and assurances
>> discredited, that's a "new" fact. A good example was the discovery in
>> TLS-AUTHZ that the assurances made by the document authors that patents
>> were disclosed according to RFC3979 was false. In the TLS-AUTHZ case,
>> the discovery of false facts justified the removal of IESG approval.
>>
>> In this case, it was asserted that there was a serious problem with open
>> recursors being used in attacks. That asserted fact was the motivation
>> for this document. However, in the time since the first two attacks, we
>> have seen no evidence of any further attacks, and the two small
>> motivating attacks now seem in retrospect to be contrived for this
>> document. The motivating attacks were first reported on NANOG, which
>> has previously made false statements deceiving the public and network
>> operators, and is therefore not a reliable source. See
>> http://www.iadl.org/nanog/nanog-story.html Requests for substantiation
>> and evidence of the claims of serious attacks have not been
>> affirmatively answered in two years. No direct or indirect evidence for
>> further, serious attacks has been produced at all.
>>
>> Analysis also shows an alternative DNS attack that requires less effort
>> from the attacker, does not expose the attacker to discovery, and is
>> much harder to mitigate and more damaging. There is no reason anyone
>> considering using DNS as an attack vector would use open recursors.
>> Analysis also shows that an attack using open recurors is easy to
>> mitigate.
>
>
> Do you deny that the vulnerabilities described in this document *could*
> be exploited? If this is your claim, and you can substantiate it, the WG
> will entertain your objection.
>
> However, if you are arguing any or all of the following, the WG will not
> entertain your objection:
>
> - that there have only been two attacks
> - that these attacks were contrived
> - that the organization reporting these attacks is not credible
> - that the organization reporting these attacks has not satisfied your
> requests for evidence
> - that there are easier ways to attack DNS
>
> This is because vulnerabilities need to be mitigated, regardless of
> whether they have been exploited.
>
>> The above are significant contrary facts that undermine the original
>> consensus (if there even was one, next)
>>
>> On the point of consensus, I do not see that a WGLC succeeded for this
>> document. A last call held in November 2006 resulted in most people
>> being against this document. The last message with "WGLC" and "evil" in
>> the subject line was on November 21, 2006, extending date of the WGLC.
>> After the extension, there are several new versions, but no WG last
>> call. I'm not entirely sure why this document is in the state 'IESG
>> Evaluation' or how it got to state "Publication Requested" by Ron Bonica
>> given the Working Group record and the objections raised. According to
>> Section 7.5 of RFC2418, a rough consensus must exist before such a
>> request for publication is made by the WG chair(s) to the Area
>> director. It should also be noted that strong disapproval was voice in
>> the 2006 WGLC. The strong disapproval was based, in part, on the lack of
>> credible evidence supporting the need for this document. Two years
>> later, lack of evidence of real attacks is still a problem. There is no
>> widespread ISP support for, or call for, this document.
>
> Please see the minutes from IETF 67. It appears that most comments were
> accepted and addressed in subsequent versions of the draft. The WG chair
> appropriately determined that another WG last call was not required.
>
> Ron
>
>
>
>> I strongly disapprove this document, object to the submarined approval
>> process, and will appeal this document to the limit of the appeals
>> process.
>>
>> --Dean
>>
>> On Sat, 6 Sep 2008, Peter Koch wrote:
>>
>>> On Mon, Sep 01, 2008 at 10:45:02AM -0700, [EMAIL PROTECTED] wrote:
>>>
>>>> Title : Preventing Use of Recursive Nameservers in Reflector
>>>> Attacks
>>>> Author(s) : J. Damas, F. Neves
>>>> Filename : draft-ietf-dnsop-reflectors-are-evil-06.txt
>>>> Pages : 8
>>>> Date : 2008-09-01
>>> this draft is in the "IESG Evaluation" state.
>>> The purpose of this update was to address the issues raised in the last
>>> remaining
>>> DISCUSS during IESG review (as mentioned during the DNSOP session in
>>> Dublin).
>>> You can visit the changes (non-editorial only affecting the security
>>> considerations section) through the tools site:
>>> <http://tools.ietf.org/wg/dnsop/draft-ietf-dnsop-reflectors-are-evil/>
>>> Editors, AD and shepherd (me) judged these changes to be minor enough and
>>> non controversial not to require another WG round.
>>> The draft will be approved as soon as the DISCUSS will have been released.
>>>
>>> To clarify, there's nothing that would suggest against the chairs' judgement
>>> of WG consensus being maintained. That said, any further discussion of
>>> whether or not the draft should have been worked on is probably
>>> counterproductive
>>> and consuming energy better spent on other current topics.
>>> As any document, this document can be revisited at a later stage with time
>>> passed and new facts on the table.
>>> I'd not consider the perceived absence of facts establishing a "new fact".
>>>
>>> -Peter [wearing a chair's hat]
>>> _______________________________________________
>>> DNSOP mailing list
>>> [email protected]
>>> https://www.ietf.org/mailman/listinfo/dnsop
>>>
>>>
>
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop