> ?I don't even see DNSSEC helping much here, either, given that the
attacker could just strip out the DNSSEC
> info (unless, perhaps, the home computers were running full (vs stub)
recursive resolvers that also did DNSSEC-validation).

Recursive resolvers, if run responsibly can help alleviate some of the
problems. For example, one can use IP address-based authorization and the
inbound interface (where queries arrive) to limit recursion to authorized
clients (BCP 140 <http://www.ietf.org/rfc/rfc5358.txt>), apply response
rate limiting (DNS RRL <http://ss.vix.su/~vixie/isc-tn-2012-1.txt>), and
use traffic filters to prevent source IP spoofing (BCP
38)<http://tools.ietf.org/html/bcp38> on
your networks. For mobile clients, BCP 140 recommends that you have clients
connect to your network using a VPN, where they can use your recursive
resolver. BCP 140 also suggests that you might run a local caching
recursive resolver on mobile devices.

N


On 7 March 2014 22:11, <dnsop-requ...@ietf.org> wrote:

> Send DNSOP mailing list submissions to
>         dnsop@ietf.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         https://www.ietf.org/mailman/listinfo/dnsop
> or, via email, send a message with subject or body 'help' to
>         dnsop-requ...@ietf.org
>
> You can reach the person managing the list at
>         dnsop-ow...@ietf.org
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of DNSOP digest..."
>
>
> Today's Topics:
>
>    1. Re:  DNS privacy and Team Cymru's report on 300, 000 SOHO
>       routers with compromised DNS settings (Paul Wouters)
>    2. Re:  DNS privacy and Team Cymru's report on 300, 000 SOHO
>       routers with compromised DNS settings (Tony Finch)
>    3.  Updating Parent Zones proposal - feedback from registries
>       and registrars (Francisco Arias)
>    4.  CPE devices doing DNSSEC (Mark Andrews)
>    5. Re:  CPE devices doing DNSSEC (Joe Abley)
>    6. Re:  pushing updates to the parent (Tony Finch)
>    7.  Passive DNS COF (Lawrence Conroy)
>    8. Re:  pushing updates to the parent (Joe Abley)
>    9.  I-D Action:
>       draft-ietf-dnsop-dnssec-roadblock-avoidance-00.txt
>       (internet-dra...@ietf.org)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Fri, 7 Mar 2014 04:00:34 -0500 (EST)
> From: Paul Wouters <p...@cypherpunks.ca>
> To: Dan York <y...@isoc.org>
> Cc: "dnsop@ietf.org" <dnsop@ietf.org>
> Subject: Re: [DNSOP] DNS privacy and Team Cymru's report on 300, 000
>         SOHO routers with compromised DNS settings
> Message-ID: <alpine.lfd.2.10.1403070357140.10...@bofh.nohats.ca>
> Content-Type: TEXT/PLAIN; format=flowed; charset=ISO-8859-15
>
> On Thu, 6 Mar 2014, Dan York wrote:
>
> > Now, in this case the attackers compromised the local network devices
> and took over control of the local recursive resolvers. ?In this
> > case of the attacker controlling the recursive resolver, I don't know
> that any of the various solutions thrown around today would do
> > anything to help with this.
>
> Run a local resolver and reconfigure it automatically (eg using
> dnssec-trigger and friends) to use the DHCP obtained DNS servers
> only as forwarders.
>
> > ?I don't even see DNSSEC helping much here, either, given that the
> attacker could just strip out the DNSSEC
> > info (unless, perhaps, the home computers were running full (vs stub)
> recursive resolvers that also did DNSSEC-validation).
>
> If the domains were signed, even if you used the rogue DNS as forwarder,
> you would at least notice you are under attack.
>
> Paul
>
>
>
> ------------------------------
>
> Message: 2
> Date: Fri, 7 Mar 2014 09:20:51 +0000
> From: Tony Finch <d...@dotat.at>
> To: Paul Wouters <p...@cypherpunks.ca>
> Cc: "dnsop@ietf.org" <dnsop@ietf.org>, Dan York <y...@isoc.org>
> Subject: Re: [DNSOP] DNS privacy and Team Cymru's report on 300, 000
>         SOHO routers with compromised DNS settings
> Message-ID:
>         <alpine.lsu.2.00.1403070910170.19...@hermes-1.csi.cam.ac.uk>
> Content-Type: text/plain; charset="utf-8"
>
> Paul Wouters <p...@cypherpunks.ca> wrote:
> > On Thu, 6 Mar 2014, Dan York wrote:
> >
> > >?I don't even see DNSSEC helping much here, either, given that the
> > > attacker could just strip out the DNSSEC info (unless, perhaps, the
> > > home computers were running full (vs stub) recursive resolvers that
> > > also did DNSSEC-validation).
> >
> > If the domains were signed, even if you used the rogue DNS as forwarder,
> > you would at least notice you are under attack.
>
> As I understand it from the CERT Polska report, the aim of the malware is
> to send people to a phishing site instead of to legit banking sites etc.
>
> http://www.cert.pl/news/8019/langswitch_lang/en
> (if you get a redirect try reloading the link)
>
> If properly deployed, with validation on the users' end hosts, DNSSEC
> would absolutely have prevented this attack from successfully stealing
> banking credentials.
>
> Tony.
> --
> f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
> Northwest FitzRoy, Sole: Northerly, backing southerly later, 4 or 5,
> increasing 6 or 7, perhaps gale 8 later. Rough or very rough. Rain or
> drizzle.
> Moderate occasionally poor.
>
> ------------------------------
>
> Message: 3
> Date: Fri, 7 Mar 2014 01:47:50 -0800
> From: Francisco Arias <francisco.ar...@icann.org>
> To: Tim Wicinski <tjw.i...@gmail.com>, Mark Andrews <ma...@isc.org>
> Cc: "dnsop@ietf.org" <dnsop@ietf.org>
> Subject: [DNSOP] Updating Parent Zones proposal - feedback from
>         registries and registrars
> Message-ID: <cf3f4533.53d45%francisco.ar...@icann.org>
> Content-Type: text/plain; charset="utf-8"
>
> A option to obtain feedback from gTLD registries and registrars would be
> to use the gtld-t...@icann.org mailing list:
> https://mm.icann.org/mailman/listinfo/gtld-tech
>
> Regards,
>
> --
> Francisco.
>
>
>
>
> ------------------------------
>
> Message: 4
> Date: Fri, 07 Mar 2014 21:05:24 +1100
> From: Mark Andrews <ma...@isc.org>
> To: dnsop@ietf.org
> Subject: [DNSOP] CPE devices doing DNSSEC
> Message-ID: <20140307100524.2f42810cd...@rock.dv.isc.org>
>
>
>         What do we expect CPE devices to implement to update parent
>         zones.  100 different things to cover all the update methods
>         registrar's come up with.  Or do we say do exactly one
>         method that works in all situations?
>
>         We already have a problem today were they can't do dynamic
>         update to every dynamic dns provider because they implement
>         non standard adhoc methods rather that one standardised
>         method.
>
>         I know Registrars don't like to be told what to do but this
>         is a case where interop from 100's of CPE providers and
>         1000000's of parent zones made up of RRR zones and non RRR zones
>         needs to work reliably without lots of choice.
>
>         Mark
> --
> Mark Andrews, ISC
> 1 Seymour St., Dundas Valley, NSW 2117, Australia
> PHONE:  +61 2 9871 4742                         INTERNET: ma...@isc.org
>
>
>
> ------------------------------
>
> Message: 5
> Date: Fri, 7 Mar 2014 10:21:34 +0000
> From: Joe Abley <jab...@hopcount.ca>
> To: Mark Andrews <ma...@isc.org>
> Cc: dnsop@ietf.org
> Subject: Re: [DNSOP] CPE devices doing DNSSEC
> Message-ID: <3e0dc692-7ba0-4672-bb10-82b854bb6...@hopcount.ca>
> Content-Type: text/plain; charset=us-ascii
>
>
> On 7 Mar 2014, at 10:05, Mark Andrews <ma...@isc.org> wrote:
>
> >       What do we expect CPE devices to implement to update parent
> >       zones.  100 different things to cover all the update methods
> >       registrar's come up with.  Or do we say do exactly one
> >       method that works in all situations?
> >
> >       We already have a problem today were they can't do dynamic
> >       update to every dynamic dns provider because they implement
> >       non standard adhoc methods rather that one standardised
> >       method.
>
> https://xkcd.com/927/
>
>
> Joe
>
>
>
> ------------------------------
>
> Message: 6
> Date: Fri, 7 Mar 2014 10:49:50 +0000
> From: Tony Finch <d...@dotat.at>
> To: Joe Abley <jab...@hopcount.ca>
> Cc: dnsop@ietf.org
> Subject: Re: [DNSOP] pushing updates to the parent
> Message-ID:
>         <alpine.lsu.2.00.1403071025270.19...@hermes-1.csi.cam.ac.uk>
> Content-Type: TEXT/PLAIN; charset=US-ASCII
>
> Joe Abley <jab...@hopcount.ca> wrote:
> >
> > https://xkcd.com/927/
>
> So from the standards development point of view, I think what this is
> saying is that success is more likely to come from building on what people
> are already doing and nudging more of them to do it more similarly.
>
> The problem with the parent update process is that there's a hopeless zoo
> of more-or-less crappy APIs almost none of which are good foundations.
>
> For a push-style protocol there are two parts: finding out where to push
> the update; and how to push the update.
>
> The where question ought to be answered by whois or weirds or _update SRV
> records.
>
> The how question ought to be answered by EPP (from registrant to
> registrar) or DNS UPDATE. It would be nice if there were software to
> gateway between one and the other.
>
> Tony.
> --
> f.anthony.n.finch  <d...@dotat.at>  http://dotat.at/
> Humber: Southwest 6 to gale 8, becoming variable 4, then southeast 5 later.
> Slight or moderate. Rain, becoming fair. Moderate becoming good.
>
>
>
> ------------------------------
>
> Message: 7
> Date: Fri, 7 Mar 2014 11:23:05 +0000
> From: Lawrence Conroy <lcon...@insensate.co.uk>
> To: dnsop@ietf.org
> Subject: [DNSOP] Passive DNS COF
> Message-ID: <b40ac4ba-0c5d-417c-9fc8-71ebf310f...@insensate.co.uk>
> Content-Type: text/plain; charset=us-ascii
>
> Hi Chaps,
>  stupid quick question, listening to the stream:
> How does this work with CDNs (I think you may need to capture the IP
> address; bailiwick could act as a proxy for that, but ...)
> all the best,
>   Lawrence
>
>
>
> ------------------------------
>
> Message: 8
> Date: Fri, 7 Mar 2014 15:39:37 +0000
> From: Joe Abley <jab...@hopcount.ca>
> To: Tony Finch <d...@dotat.at>
> Cc: dnsop@ietf.org
> Subject: Re: [DNSOP] pushing updates to the parent
> Message-ID: <8c184518-2a56-42b6-bd63-3e50f8126...@hopcount.ca>
> Content-Type: text/plain; charset=us-ascii
>
>
> On 7 Mar 2014, at 10:49, Tony Finch <d...@dotat.at> wrote:
>
> > Joe Abley <jab...@hopcount.ca> wrote:
> >
> >> https://xkcd.com/927/
> >
> > So from the standards development point of view, I think what this is
> > saying is that success is more likely to come from building on what
> people
> > are already doing and nudging more of them to do it more similarly.
>
> Sure, maybe.
>
> I think we have to consider our target audience. Part of that is to
> consider the existing menagerie and understanding the shape of the expected
> solutions space.
>
> While we in this group might find comfort in arcane binary protocols using
> UDP port 53, the habits of people who frequent the dyndns zoo seem to be
> far more tilted towards throwing JSON documents around over HTTP. It's hard
> to imagine unifying a pile of RESTish APIs with something that looks
> foreign and different.
>
> I'll +1 Andrew and say that I have my doubts (a) that the underscore
> scaffolding will ever appear in the top-most labels and (b) that anybody
> would use them if they did.
>
> My poorly-informed doubt is hardly a reason not to document the idea. But
> I think it's a stretch to expect anything more than an XKCD-927 result.
>
>
> Joe
>
>
>
> ------------------------------
>
> Message: 9
> Date: Fri, 07 Mar 2014 08:41:53 -0800
> From: internet-dra...@ietf.org
> To: i-d-annou...@ietf.org
> Cc: dnsop@ietf.org
> Subject: [DNSOP] I-D Action:
>         draft-ietf-dnsop-dnssec-roadblock-avoidance-00.txt
> Message-ID: <20140307164153.15062.39035.idtrac...@ietfa.amsl.com>
> Content-Type: text/plain; charset="utf-8"
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
>  This draft is a work item of the Domain Name System Operations Working
> Group of the IETF.
>
>         Title           : DNSSEC Roadblock Avoidance
>         Authors         : Wes Hardaker
>                           Olafur Gudmundsson
>                           Suresh Krishnaswamy
>         Filename        :
> draft-ietf-dnsop-dnssec-roadblock-avoidance-00.txt
>         Pages           : 16
>         Date            : 2014-03-07
>
> Abstract:
>    This document describes problems that a DNSSEC aware resolver/
>    application might run into within a non-compliant infrastructure.  It
>    outline potential detection and mitigation techniques.  The scope of
>    the document is to create a shared approache to detect and overcome
>    network issues that a DNSSEC software/system may face.
>
>
> The IETF datatracker status page for this draft is:
>
> https://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-roadblock-avoidance/
>
> There's also a htmlized version available at:
> http://tools.ietf.org/html/draft-ietf-dnsop-dnssec-roadblock-avoidance-00
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
>
>
> ------------------------------
>
> Subject: Digest Footer
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
>
> ------------------------------
>
> End of DNSOP Digest, Vol 88, Issue 21
> *************************************
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to