Re: [dns-operations] [DNSOP] dnsop-any-notimp violates the DNS standards

2015-03-12 Thread Michael Graff

Packet size is harder to analyze. ANY often pulls some records that
aren't used, and if the site isn't configured carefully then ANY can
even end up falling back to TCP, costing bytes _and_ packets. On the
other hand, there are a huge number of Internet sites that don't have a
noticeable volume of unusual records and don't need TCP, and there's a
clear traffic win for every skipped query and skipped no-data response.

My guess is that with DNSSEC, this will be common, as often times the domain 
apex is where the email would be sent.  For my personal domain, that’s 
@flame.orghttp://flame.org, and weighs in at 1758 bytes to an ANY query right 
now.

Once this is done, the MX target then needs to be followed of course (or 
targets in the case of a failure to connect.)

In the following, I’m using ESND0.  If this isn’t true, we all know anything  
512 bytes as a response was a TCP hit.  I’m not as scared of TCP hits as others 
may be, but I do think they should be avoided when practical.

ANY comes in as 1769 with or without DNSSEC.  Had it asked for the MX directly, 
it would have gotten 60 bytes without DNSSEC, and 229 with.

If there was no MX record, I assume then another query would be issued for the 
 and A records.  That’s two more queries, but both of which would be 
smallish in comparison to the ANY query.  The DNSSEC keys nearly always 
dominate ANY queries at the apex.

I’m happy we are discussing issues with ANY queries, and the fairly small 
number of clients that use them.  I would have to see hard numbers collected 
over a lot of data showing where the ANY query was actually better than 
following the MX, , A path.  Until data is collected from how people set 
up zones today, I’m not sure I can say one is better than the other, other than 
as a feeling that it might help reduce queries but I’m not sure it reduces 
bandwidth.

What problem are we specifically trying to solve here again?

—Michael

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] question for DNS being attacked

2012-06-28 Thread Michael Graff
Yes, but also this.  (expanded from feel)

It may also make Kaminsky style attacks easier if an attacker can blind an auth 
server from handing out responses.  If the counter values are real from the RFC 
style paper, every other response becomes a truncated reply in a flood 
situation.  This will extend the attack window by  the time it takes to 
establish a TCP connection and query, or to the time it takes to retransmit the 
query plus TCP handshake if the blinding is successful.  This assumes the 
second query works.  But in reality it has the same chance as the first.

Assuming about 100ms for TCP handshake and two seconds for timeout and retry 
followed by the TCP handshake, This means the window for potential false 
responses moves to about 1100ms on average. 

If a UDP reply would normally make it to the server in 100 ms, this opens a 
window 11 times as wide.

This simple math only accounts for one server, however.  Someone with better 
probabilistic skills than I have, at 1:30am, should do the math with more than 
one server, and include the attack probably as well.

--Michael

On Jun 28, 2012, at 1:15, pangj pa...@riseup.net wrote:

 
 Even with the slip values, I still feel this can open a wider window for 
 other forms of attacks against a DNS zone.
 
 For example, the attacker spools with a legetimate IP and make a number of 
 queries, thus RRL blocks that legetimate IP by mistake?
 
 -- 
 Email/Jabber/Gtalk: pa...@riseup.net
 Free DNS Hosting with www.DNSbed.com
 
 
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] question for DNS being attacked

2012-06-28 Thread Michael Graff

On Jun 28, 2012, at 9:06 AM, Vernon Schryver wrote:
 
 That conclusion does not hold, because it does not define the narrow
 window alternative.  11 times as wide as what?

With a slip factor of 2, every other packet will be dropped, and the other 
packets returned will have the truncated bit set.  If this is incorrect, please 
explain what it does do.

This translates to a normal truncated response 50% of the time, and a timeout 
the other 50%.  Ignoring the penalty BIND 9 and other servers are likely to 
assign to this misbehaving server, the timeout keeps the Waiting for a 
response window open much, much longer.  This timeout is largely 
server-dependent, and some may wait multiple seconds.  This leaves the window 
open for a spoofing flood attack to sneak in.

While I commend you and Paul on the RLL work you've made, I think it is 
improper to not mention this in the documents you write.  It may be not a big 
deal to the administrator of the zone, but it is up to them to decide that.  
Some may prefer to be a flooding source rather than make their zone more prone 
to spoofing, even if the actual odds are low.  The biggest problem here is that 
the zone publisher's goals of not being spoofable are entirely dependent on the 
resolver asking the questions, without DNSSEC in the mix.

--Michael

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] question for DNS being attacked

2012-06-28 Thread Michael Graff

On Jun 28, 2012, at 1:37 PM, Vernon Schryver wrote:
 
 A separate aspect of this supposedly much, much longer window is that
 it seems to assume that after the client has received a truncated or
 TC=1 response and is going through the DNS/TCP dance, it will still
 accept forged, evil DNS/UDP responses from the attacker.  Is that true
 of common resolving servers and resolver libraries?  It's not how I'd
 write a resolver.  Instead I'd discard all of the state needed to
 accept apparently stale UDP responses before the TCP SYN is sent.

Please correct me if I misunderstand the following statement.  A slip rate of 
2 drops 50% of the outgoing answers for a specific tuple, and returns a 
truncated response for the other 50%.  If I do not understand that behavior, 
ignore the rest of the message and I'll re-evaluate my concerns.  Also, is the 
default slip rate 2?

If that is the case, then if a legitimate query comes into an auth server which 
is currently being rate limited, the reply will be dropped 50% of the time.  
So, half the time it gets no response (== timeout) and the other half it gets a 
truncated response, thereby translating into TCP (which is another whole can of 
worms I'm leaving for later.)

If it gets a truncated response, all is well enough.  If it gets no response, 
the additional time it waits will leave the window open for spoofing, using 
whatever lengths it has configured or defaults to.

I'm not worried about the TC=1 response case here, although I would point out 
that an attacker being able to change the behavior of a system just by 
attacking it seems scary as well, and causing a server to have to fall back to 
TCP more often and an auth server to have to respond to more TCP than it 
otherwise would seems like a major behavioral change, and I can think of 
several interesting attacks based on that alone.

--Michael

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Re: [dns-operations] question for DNS being attacked

2012-06-28 Thread Michael Graff

On Jun 28, 2012, at 1:55 PM, Paul Vixie wrote:
 we are now in the post-apocalyptic road-warrior phase of non-DNSSEC's 
 history. it's difficult for me to imagine anyone choosing to remain an attack 
 amplifier when they could instead sign their zones. but you're entirely right 
 about the tradeoff transparency; vernon and i do not intend to slip this 
 decision into an operator's life without their knowledge and consent.

BCP 38  Enough said.

--Michael

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] question for DNS being attacked

2012-06-28 Thread Michael Graff

On Jun 28, 2012, at 2:35 PM, Paul Vixie wrote:

 On 6/28/2012 7:10 PM, Michael Graff wrote:
 
 BCP 38  Enough said.
 
 what does that mean?

It means that time and time again, either sufficient mass must implement a 
feature like this, or it is effectively pointless.  It also means that the pain 
of installing such a security feature is on the side that does not feel the 
pain.

But, unlike BCP38 which would make a difference if enough ISPs implemented it, 
this is another form of an arms race against a well armed opponent.  That said, 
the slip factor is clever, but I still worry about translating what would be 
a UDP timeout into a TCP query in addition to a filter that takes only 5 
sequential packets to activate.

--Michael

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] question for DNS being attacked

2012-06-27 Thread Michael Graff

On Jun 28, 2012, at 12:10 AM, Paul Vixie wrote:
 DNS RRL looks for unnatural similarities in a ip-src, dns-response
 flow, and limits the rate accordingly. it will not stop a random-sourced
 attack nor a widely-reflected attack, but it has been shown to stop
 targetted attacks using a small number of reflectors.
 
 there is a technical note at http://www.redbarn.org/dns/ratelimits
 which describes the approach in detail.


The RLL tech may not be supported by ISC, but the URL 
http://ss.vix.com/~vixie/isc-tn-2012-1.txt says it is copyright by ISC.

I still fear this sort of rate limiting (or possibly any major rate limiting 
that isn't fair-share outgoing bandwidth limiting) can cause other issues, 
including some security issues.  It may solve the distributed flood using DNS 
as an amplification, but until I see a write up on exactly how it performs with 
more than just a description, and a few people outside of the two developers 
analyze that methodology, I would not use this system in production.

Even with the slip values, I still feel this can open a wider window for other 
forms of attacks against a DNS zone.

--Michael

___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs


Re: [dns-operations] Why would an MTA issue an ANY query instead of an MX query?

2012-06-10 Thread Michael Graff
So if enough people stopped answering users of qmail might change the field, 
even if the author won't change the code. 

--Michael (from an iPhone)


On Jun 10, 2012, at 5:29, sth...@nethelp.no wrote:

 Clue appreciated, thanks!
 
 One word: qmail. Google qmail dns any query.
 
 It would actually be *good* to stop answering the ANY queries if that
 would force qmail installations do something about this behavior. But
 I don't have high hopes...
 
 Steinar Haug, Nethelp consulting, sth...@nethelp.no
 
 
 ___
 dns-operations mailing list
 dns-operations@lists.dns-oarc.net
 https://lists.dns-oarc.net/mailman/listinfo/dns-operations
 dns-jobs mailing list
 https://lists.dns-oarc.net/mailman/listinfo/dns-jobs
___
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs