Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Dean Anderson
On Tue, 2 Sep 2008, Danny McPherson wrote:

> 
> On Sep 2, 2008, at 12:44 PM, Dean Anderson wrote:
> >
> > I find this hard to believe from three standpoints:
> >
> > 1) the expected number of open DNS recursors and their collective
> > bandwidth doesn't seem to be large enough to support a 40Gbps attack.
> 
> Really?  With trivial amplification vectors 20 low-speed broadband
> connected bots can generate nearly 1.5 Gbps of attack traffic.  

It isn't the case that many open recursors are on low-speed broadband 
connections; That is a residential service, while recursors are usually 
run by businesses or ISPs, which changes a number of things.

I also suppose you expect that 20 * 384kbps * 100x = 1.5Gbps.
 (384kbs upload speed)
 (100x amplification factor)

The error in your estimate is that you assume if there are bots to send
demand, that there are recursors to handle the load. This just isn't the
case.

The estimate is an ideal maximum, assuming a lot of things are true that
aren't true. For example, one never has ideal bandwidth available to any
host.  And one must still have enough recursors to can handle the
offered load.  But there aren't enough recursors to provide the load.  
There are only about 20k or so recursors, and most don't sit on high
bandwidth connections.  Many don't support EDNSO, so can't get more than
about 10x amplification, anyway.

Most businesses and ISPs would probably soon notice their participation
in a DDOS attack due to their own bandwidth consumption and block the
(spoofed) source address without damage as a result of the block, or an
upstream carrier would block the spoofed source, also without collateral
damage.  

Furthermore, its relatively easy to change the IP address of a
recursor. Abusers need to keep scanning.

> So, that'd put you around 500 or so bots, and any number of open
> resolvers, to generate such an attack, which is low-hanging fruit
> these days.  

Really? Recursors are "low hanging fruit'? By what measure?

> Of course, the reported amplification vector was higher
> than this, the number of bots lowers.

Higher than what?  You can't get more than about 100x from DNS under 
ideal conditions. 

> > 2) Why would anyone capble of programming bother searching for open
> > recursors (with often small connection speeds) when they can use 100+
> > root servers with large amplification factors and high bandwidth
> > connections at key exchange points?
> 
> We'll leave that an exercise for the reader...

Let's not, since its important to consider the alternatives available to
the attacker and the costs of this proposal.  Significantly, the abuser
has an option that doesn't expose them to discovery by their scanning
efforts, and the other attack isn't very easy to mitigate. It doesn't
require the effort of scanning, or of distributing a payload of
recursors to the bots. Quite a lot easier to do.  This seems to make the
other attack much more attractive. Something about low-hanging fruit???

> > 3) Why aren't these attacks being prosecuted? Someone searching for
> > open recursors is bound to be noticed.  The only people I know of
> > searching for open recursors is UltraDNS and a scientific group at
> > Cornell.
> 
> Searching for open recursors and launching an attack are
> two entirely different things.  

Yes. One must precede the other. Scanning comes first.  And abusers need
to keep scanning, which puts them at a disadvantage for this attack.

> And launching spoofed-based attacks makes finding the attacking
> sources more difficult.  And given that they're most always botted,
> you then have to find a C&C, and then an attacker stepping stone,
> etc.., etc., No need for rehashes of this here, methinks.

Finding the C&C for a botnet that must keep scanning to conduct abuse
should be easier than for a botnet that doesn't need to scan. You find
the person scanning and you found the person involved in the C&C.

Also, one doesn't need to find the attacking source with recursor abuse.  
Its a very mitigatable attack. Just like open proxy abuse, one can
usually block the recursor without collateral damage.  

Significantly, one can't easily mitigate the other attack (ala DNSSEC
responses) of roots, TLDs, major domain's authority servers. Blocking
authority servers generally does significant damage; roots, TLDs, major
domains in particular can't be blocked.

> > I'll wait to see the report.  It will also be interesting to find out
> > who was surveyed. If it turns out to be primarilly NANOG (the source  
> > of
> > the original reports), I'll be more dubious.
> 
> No, there's quite a wide distribution of responses, but mostly
> *OG types in various regions.

Ahh. Figured as much.


> >  Mr. McPherson is
> > associated with NANOG, attending 18 meeting as of NANOG 42; Only 46
> > people have attended more NANOG meetings than Mr. McPherson.
>
> Interesting tidbit, I had no idea.  Useless, but interesting :-)

Useless to you perhaps. Not so useless to everyone.  But its

Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Dean Anderson
On Tue, 2 Sep 2008, Joe Abley wrote:

> 
> On 2 Sep 2008, at 13:43, Dean Anderson wrote:
> 
> > Really? Your position is that there are attacks but all these attacks
> > are somehow being kept secret?  People talked about ping floods, syn
> > floods, and an uncountable slew of other attacks. Incredible.
> 
> My point is that there are a large number of distributed denial of  
> service attacks happening every day, on a scale large enough to  
> involve multiple providers and cross-organisational teams for  
> mitigation.
> 
> When new attack techniques emerge, sometimes they make the news. The  
> fiftieth DNS reflection attack on any particular day, years after the  
> technique was first described, is unlikely to be newsworthy. The fact  
> that alarm bells are not sounding in the streets doesn't mean that  
> people continue to work to mitigate such attacks, however, nor that  
> such attacks no longer happen.

Significant problems are always newsworthy, or at least
discussion-worthy on various network forums that I do monitor. There has
been no further discussion of these attacks since the two very small
motivating attacks were discussed on NANOG some time ago.  I don't see
any evidence that there have been more than two such attacks.

> The existence of closed, operational forums for the discussion and
> mitigation of denial of service attacks is no great secret to
> operators. If you're unaware, and you're an operator, feel free to
> drop me a private note. I would be very happy to let you know about
> the subscription procedures and attendant vetting by peers that would
> be required for you to participate (at least, in the forums I am aware
> of). I imagine discussions of your applicability would be
> entertaining.

I never said the existance of forums were secret.  Indeed, the genuine
forums are usually for coordination between major carriers' operations
groups, and so are only appropriate to the operations employees of those
few major carriers.  The rest of the (somewhat dubious) forums are
groups more or less like blackhat; groups basically training bad guys
and/or sharing techniques amoung bad guys, or else amoung dilettantes.  
Because I am not currently employed in the operations department of a
large major carrier myself, I would be unable to actually mitigate any
in-progess attacks. Moreover, I've always worked for major carriers in
engineering, not operations. So I can't imagine why I would ever want to
be in genuine forum, nor would I want to be in any dubious forum. I note
that you aren't employeed by any of the major carriers, either. In
anycase, I doubt that I would need your assistance with any application.

However, not participating in the actual mitigation efforts doesn't mean
that attacks aren't discussed post-mortem.  These discussions are
usually more widespread and are more public. But you have no evidence of
such discussion, nor evidence of any actual attacks whatsoever after the
motivating attacks. 

> At a higher level, you seem to be seeking some measure of proof
> regarding the existence of something. My aim was not to provide proof
> of anything, since as far as I know this is not a court of law, a
> philosophy class nor a distillery. Apologies if that was not clear.

I guessed that your aim was not to provide proof of your assertions.  
However, for your claims to be credible, there needs to be some evidence
that this is a problem that needs to be solved, that the costs are
justified. You have no evidence of there being a problem and your claims
are not credible because of the lack of evidence. The costs imposed on 
legitimate open recursors are unjustified.

> > If these attacks were indeed happening, someone, somewhere would be
> > talking about specific attacks.
> 
> And my point is that they are. Your point is that you don't believe
> me. I might make the point that I don't care who believes me.  
> Regardless, I will continue not to lose sleep.

The people who don't believe you won't lose sleep either when we
collectively decide you don't have a genuine problem to be solved, or
don't have any evidence of a genuine problem.

> >>> And I was serious about the t-shirt, if the price is reasonable.  
> >>> XXL,
> >> thanks.
> >
> > Then you should know that this isn't a proper forum to be soliciting  
> > me
> > about t-shirts.
> 
> Shame. Perhaps someone else will do the right thing and start selling  
> av8 t-shirts with such pithy catchphrases, given your documented lack  
> of interest in exploiting this no-doubt lucrative opportunity.

Then I guess they'll learn about the law on trademark infringement.

--Dean


-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] DNSKEY / multiprecision number format? (fwd)

2008-09-02 Thread Mark Andrews

> If someone could forward this to DNSEXT WG, I would appreciate it.
> 
> Thanks,
> 
>   --Dean
> 
> -- Forwarded message --
> Date: Sat, 30 Aug 2008 23:14:44 -0400 (EDT)
> From: Dean Anderson <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: DNSKEY / multiprecision number format?
> 
> I'm wondering how the exponent and modulus are stored in a DNSKEY record 
> for RSASHA1.  RFC3110 just makes some vague references to where things 
> go, but does not define their precise format: 
> 
>  exponent length   1 or 3 octets (see text)
>  exponent  as specified by length field
>  modulus   remaining space

The numbers are in network byte order.
 
> The format of large binary numbers is never specified in RFC3110, and no
> standard exists that I can find. I notice that BIND tools just use the
> openssl library calls bn2bin, which produces an undefined and
> non-standardized openssl format.  GMP and presumably other
> multiprecision libraries have their own format. GMP's mpz_import
> function has a number of parameters for importing from different binary
> multiprecision number formats:
> 
>   count, 
>   order, 
>   size, 
>   endian, 
>   nails
> 
> http://gmplib.org/manual/Integer-Import-and-Export.html#Integer-Import-and-Ex
> port
>  "The parameters specify the format of the data. /count/ many words are 
>   read, each /size/ bytes. order can be 1 for most significant word
>   first or -1 for least significant first. Within each word /endian/ can
>   be 1 for most significant byte first, -1 for least significant first,
>   or 0 for the native endianness of the host CPU. The most significant
>   /nails/ bits of each word are skipped, this can be 0 to use the full
>   words. "

As for any integer in network byte order, "count, 1, 1, 1, 0".
 
> The only one that can be inferred from an instance of an DNSKEY RR is
> count.
> 
> So, can anyone say what the remaining 4 parameters should be for DNSKEY
> and other DNSSEC records?
> 
> Is there an RFC that defines these parameters?
> 
> Thanks,
> 
>   --Dean
> 
> 
> -- 
> Av8 Internet   Prepared to pay a premium for better service?
> www.av8.net faster, more reliable, better service
> 617 344 9000   
> 
> 
> 
> ___
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I think we may have a solution - DNSCurve

2008-09-02 Thread Mark Andrews

> On Mon, Sep 01, 2008 at 04:49:12PM -0400,
>  Paul Wouters <[EMAIL PROTECTED]> wrote 
>  a message of 18 lines which said:
> 
> > many issues there which are not addressed [...] authenticated denial
> > of existence,
> 
> Although I agree with your criticism that there is no published
> *specification* of DNScurve (wether in Internet-Draft form or else),
> this specific issue seems addressed today: DNScurve signs the packet,
> not the resource records, and therefore a NXDOMAIN response can be
> signed (unlike what happens with DNSSEC).

A NXDOMAIN response if cyptographically proved with DNSSEC.

There are other rcodes that DNSSEC does not cover but NXDOMAIN
is not one of them.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Kevin Darcy
Dean Anderson wrote:
>
> A useful
> technique for scan detection is a non-production special "server".  
> Scanners show up in the logs; no one else does. Dnscache, BIND, and
> PowerDNS all have necessary the logging capabilities.
>
>   
http://en.wikipedia.org/wiki/Honeypot_(computing)

- Kevin

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] [dns-operations] Signed .cz zone

2008-09-02 Thread Mark Andrews

http://img.nic.cz/nic_bg_hlavicka_en.gif')">

Firefox complains about insecure content.

-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Mark Andrews

> 2) Why would anyone capble of programming bother searching for open
> recursors (with often small connection speeds) when they can use 100+
> root servers with large amplification factors and high bandwidth
> connections at key exchange points?

Because there are much better amplification factors available
than those you can produce using the root servers.  The
roots still only send unfragmented UDP responses.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: [EMAIL PROTECTED]
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I think we may have a solution - DNSCurve

2008-09-02 Thread David Conrad
Bert,

On Aug 31, 2008, at 1:34 PM, bert hubert wrote:
> Technically, this may be true - but I got into trouble over an AES- 
> based
> random generator, even though it does not encrypt any user supplied  
> data.

Back when I was trying to get an early version of BIND shipped with  
RSA BSAFE (around the turn of the century), I got hung up with lawyers  
(coincidentally enough, including the same lawyer DJB used for his  
lawsuit against the US government over cryptography and the lawyer who  
wrote one of the books lawyers used to use for export-related matters)  
trying to figure out if we needed to get a license from the US  
government to export "munitions".  Our approach was to point out  
repeatedly that DNSSEC provided authentication only and not encryption  
(and try to ignore Rivest's "Chaffing and Winnowing" paper).  After  
about a year of fruitless discussion with the Bureau of Export  
Administration, the USG changed their policy and allowed exports with  
a self-declared license for the stuff we were doing.

> It does create problems though.

Not having looked at this (or consulted a lawyer), I would guess  
things would probably be much more complicated today given the current  
political situation as well as the fact that DNSCurve actually does do  
encryption.  But that would only be a guess...

Regards,
-drc

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] Signed .cz zone

2008-09-02 Thread Ondřej Surý
Hello all,

we have signed .cz on Sep 1st 2008.  Key can be found at
https://www.nic.cz/dnssec/ (bottom of the page).

EPP interface for registering DS RRsets will be launched
on Sep 30 2008.

Please report any errors (hope there are none) or sugestions
to my address.

Regards,
-- 
 Ondřej Surý
 technický ředitel/Chief Technical Officer
 -
 CZ.NIC, z.s.p.o. -- .cz domain registry
 Americká 23,120 00 Praha 2,Czech Republic
 mailto:[EMAIL PROTECTED] http://nic.cz/
 sip:[EMAIL PROTECTED] tel:+420.222745110
 mob:+420.739013699 fax:+420.222745112
 -
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Danny McPherson

On Sep 2, 2008, at 12:44 PM, Dean Anderson wrote:
>
> I find this hard to believe from three standpoints:
>
> 1) the expected number of open DNS recursors and their collective
> bandwidth doesn't seem to be large enough to support a 40Gbps attack.

Really?  With trivial amplification vectors 20 low-speed broadband
connected bots can generate nearly 1.5 Gbps of attack traffic.  So,
that'd put you around 500 or so bots, and any number of open resolvers,
to generate such an attack, which is low-hanging fruit these days.  Of
course, the reported amplification vector was higher than this, the
number of bots lowers.

> 2) Why would anyone capble of programming bother searching for open
> recursors (with often small connection speeds) when they can use 100+
> root servers with large amplification factors and high bandwidth
> connections at key exchange points?

We'll leave that an exercise for the reader...

> 3) Why aren't these attacks being prosecuted? Someone searching for  
> open
> recursors is bound to be noticed.  The only people I know of searching
> for open recursors is UltraDNS and a scientific group at Cornell.

Searching for open recursors and launching an attack are
two entirely different things.  And launching spoofed-based
attacks makes finding the attacking sources more difficult.  And
given that they're most always botted, you then have to find a
C&C, and then an attacker stepping stone, etc.., etc.,  No need
for rehashes of this here, methinks.

> I'll wait to see the report.  It will also be interesting to find out
> who was surveyed. If it turns out to be primarilly NANOG (the source  
> of
> the original reports), I'll be more dubious.

No, there's quite a wide distribution of responses, but mostly
*OG types in various regions.

>  Mr. McPherson is
> associated with NANOG, attending 18 meeting as of NANOG 42; Only 46
> people have attended more NANOG meetings than Mr. McPherson.

Interesting tidbit, I had no idea.  Useless, but interesting :-)

-danny
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] I think we may have a solution - DNSCurve

2008-09-02 Thread Stephane Bortzmeyer
On Mon, Sep 01, 2008 at 04:49:12PM -0400,
 Paul Wouters <[EMAIL PROTECTED]> wrote 
 a message of 18 lines which said:

> many issues there which are not addressed [...] authenticated denial
> of existence,

Although I agree with your criticism that there is no published
*specification* of DNScurve (wether in Internet-Draft form or else),
this specific issue seems addressed today: DNScurve signs the packet,
not the resource records, and therefore a NXDOMAIN response can be
signed (unlike what happens with DNSSEC).




___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Joe Abley

On 2 Sep 2008, at 13:43, Dean Anderson wrote:

> Really? Your position is that there are attacks but all these attacks
> are somehow being kept secret?  People talked about ping floods, syn
> floods, and an uncountable slew of other attacks. Incredible.

My point is that there are a large number of distributed denial of  
service attacks happening every day, on a scale large enough to  
involve multiple providers and cross-organisational teams for  
mitigation.

When new attack techniques emerge, sometimes they make the news. The  
fiftieth DNS reflection attack on any particular day, years after the  
technique was first described, is unlikely to be newsworthy. The fact  
that alarm bells are not sounding in the streets doesn't mean that  
people continue to work to mitigate such attacks, however, nor that  
such attacks no longer happen.

The existence of closed, operational forums for the discussion and  
mitigation of denial of service attacks is no great secret to  
operators. If you're unaware, and you're an operator, feel free to  
drop me a private note. I would be very happy to let you know about  
the subscription procedures and attendant vetting by peers that would  
be required for you to participate (at least, in the forums I am aware  
of). I imagine discussions of your applicability would be entertaining.

At a higher level, you seem to be seeking some measure of proof  
regarding the existence of something. My aim was not to provide proof  
of anything, since as far as I know this is not a court of law, a  
philosophy class nor a distillery. Apologies if that was not clear.

> If these attacks were indeed happening, someone, somewhere would be
> talking about specific attacks.

And my point is that they are. Your point is that you don't believe  
me. I might make the point that I don't care who believes me.  
Regardless, I will continue not to lose sleep.

>>> And I was serious about the t-shirt, if the price is reasonable.  
>>> XXL,
>> thanks.
>
> Then you should know that this isn't a proper forum to be soliciting  
> me
> about t-shirts.

Shame. Perhaps someone else will do the right thing and start selling  
av8 t-shirts with such pithy catchphrases, given your documented lack  
of interest in exploiting this no-doubt lucrative opportunity.


Joe
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] DNSKEY / multiprecision number format? (fwd)

2008-09-02 Thread Dean Anderson
If someone could forward this to DNSEXT WG, I would appreciate it.

Thanks,

--Dean

-- Forwarded message --
Date: Sat, 30 Aug 2008 23:14:44 -0400 (EDT)
From: Dean Anderson <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: DNSKEY / multiprecision number format?

I'm wondering how the exponent and modulus are stored in a DNSKEY record 
for RSASHA1.  RFC3110 just makes some vague references to where things 
go, but does not define their precise format: 

 exponent length   1 or 3 octets (see text)
 exponent  as specified by length field
 modulus   remaining space

The format of large binary numbers is never specified in RFC3110, and no
standard exists that I can find. I notice that BIND tools just use the
openssl library calls bn2bin, which produces an undefined and
non-standardized openssl format.  GMP and presumably other
multiprecision libraries have their own format. GMP's mpz_import
function has a number of parameters for importing from different binary
multiprecision number formats:

  count, 
  order, 
  size, 
  endian, 
  nails

http://gmplib.org/manual/Integer-Import-and-Export.html#Integer-Import-and-Export
 "The parameters specify the format of the data. /count/ many words are 
  read, each /size/ bytes. order can be 1 for most significant word
  first or -1 for least significant first. Within each word /endian/ can
  be 1 for most significant byte first, -1 for least significant first,
  or 0 for the native endianness of the host CPU. The most significant
  /nails/ bits of each word are skipped, this can be 0 to use the full
  words. "

The only one that can be inferred from an instance of an DNSKEY RR is
count.

So, can anyone say what the remaining 4 parameters should be for DNSKEY
and other DNSSEC records?

Is there an RFC that defines these parameters?

Thanks,

--Dean


-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Dean Anderson
On Tue, 2 Sep 2008, Danny McPherson wrote:

> On Sep 2, 2008, at 9:47 AM, Joe Abley wrote:
> >>
> >> There is "usually" no harm to anyone from open resolvers. No one has
> >> reported any further attacks since this draft was conceived.
> >
> > That is not true. It's possible that the forums in which such attacks
> > are discussed are not available to you, of course. I say that not as
> > some kind of thinly-veiled attack, but merely as an observation that
> > security ops forums tend not to be public.
> 
> I'd note that this 2008 Infrastructure Security Survey collection
> is about done, and the largest reported attack over the past
> 12 months was just north of 40 Gbps (yes, I meant to type "forty")
> and employed DNS-based reflective amplification vectors.
> 
> Others reported these attacks well above 10 Gbps in the past
> 12 months as well..
> 
> Report to be publish in next month or two.

I find this hard to believe from three standpoints:

1) the expected number of open DNS recursors and their collective
bandwidth doesn't seem to be large enough to support a 40Gbps attack.

2) Why would anyone capble of programming bother searching for open
recursors (with often small connection speeds) when they can use 100+
root servers with large amplification factors and high bandwidth
connections at key exchange points?

3) Why aren't these attacks being prosecuted? Someone searching for open
recursors is bound to be noticed.  The only people I know of searching
for open recursors is UltraDNS and a scientific group at Cornell.

I'll wait to see the report.  It will also be interesting to find out
who was surveyed. If it turns out to be primarilly NANOG (the source of
the original reports), I'll be more dubious.  Mr. McPherson is
associated with NANOG, attending 18 meeting as of NANOG 42; Only 46
people have attended more NANOG meetings than Mr. McPherson. Comparing
NANOG participation with ARIN membership shows that NANOG makes up a
very small portion of internet service providers.  NANOG has also been
the scene for other deceptions of the internet community. See
http://www.iadl.org/nanog/nanog-story.html for more information.

Perhaps what is needed is a clearinghouse for reporting and stopping DNS
scanners; besides preventing abuse, such a clearinghouse could be useful
in identifying and prosecuting the abusers. Scan detection and abuse
complaint is what drove open relay abusers out of business.  A useful
technique for scan detection is a non-production special "server".  
Scanners show up in the logs; no one else does. Dnscache, BIND, and
PowerDNS all have necessary the logging capabilities.


--Dean


-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Dean Anderson
On Tue, 2 Sep 2008, Joe Abley wrote:

> 
> On 2 Sep 2008, at 11:04, Dean Anderson wrote:
> 
> >>> There is no harm in public resolvers.
> >>
> >> Not to the people running the resolvers, usually, no.
> >
> > There is "usually" no harm to anyone from open resolvers. No one has
> > reported any further attacks since this draft was conceived.
> 
> That is not true. It's possible that the forums in which such attacks  
> are discussed are not available to you, of course. I say that not as  
> some kind of thinly-veiled attack, but merely as an observation that  
> security ops forums tend not to be public.

Really? Your position is that there are attacks but all these attacks
are somehow being kept secret?  People talked about ping floods, syn
floods, and an uncountable slew of other attacks. Incredible. 

If these attacks were indeed happening, someone, somewhere would be
talking about specific attacks.

> > I note that there have been no substantive answers to any of the
> > questions I raised, just platitudes and personal attacks.
> 
> Oh, I didn't notice any questions. In any case, I was only responding
> to what I saw as factual errors.

But you don't have any factual counter-evidence to offer to refute the
alleged factual errors.  Incredible.

> And I was serious about the t-shirt, if the price is reasonable. XXL,
> thanks.

Then you should know that this isn't a proper forum to be soliciting me
about t-shirts.

--Dean



-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Joao Damas

On 2 Sep 2008, at 02:57, Dean Anderson wrote:
>
>>> Are your resolvers public?
>> Of course not, I think there is a paper floating around here that  
>> this
>> is a bad idea ;-).
>
> Surprisingly, that paper is promoted by the same people promoting
> Anycast DNS... There is no harm in public resolvers.


actually, the paper was done on request by the dnsop wg, with a clear  
content charter put together by the wg chairs based on input from the  
wg. The editors were just the means to bring the paper into existence.

Joao
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Danny McPherson

On Sep 2, 2008, at 9:47 AM, Joe Abley wrote:
>>
>> There is "usually" no harm to anyone from open resolvers. No one has
>> reported any further attacks since this draft was conceived.
>
> That is not true. It's possible that the forums in which such attacks
> are discussed are not available to you, of course. I say that not as
> some kind of thinly-veiled attack, but merely as an observation that
> security ops forums tend not to be public.

I'd note that this 2008 Infrastructure Security Survey collection
is about done, and the largest reported attack over the past
12 months was just north of 40 Gbps (yes, I meant to type "forty")
and employed DNS-based reflective amplification vectors.

Others reported these attacks well above 10 Gbps in the past
12 months as well..

Report to be publish in next month or two.

-danny
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Joe Abley

On 2 Sep 2008, at 11:04, Dean Anderson wrote:

>>> There is no harm in public resolvers.
>>
>> Not to the people running the resolvers, usually, no.
>
> There is "usually" no harm to anyone from open resolvers. No one has
> reported any further attacks since this draft was conceived.

That is not true. It's possible that the forums in which such attacks  
are discussed are not available to you, of course. I say that not as  
some kind of thinly-veiled attack, but merely as an observation that  
security ops forums tend not to be public.

> I note
> that there have been no substantive answers to any of the questions I
> raised, just platitudes and personal attacks.

Oh, I didn't notice any questions. In any case, I was only responding  
to what I saw as factual errors. And I was serious about the t-shirt,  
if the price is reasonable. XXL, thanks.


Joe

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Reflectors are Evil was Re: Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Dean Anderson
On Tue, 2 Sep 2008, Joe Abley wrote:

> Dean,
> 
> On 1 Sep 2008, at 20:57, Dean Anderson wrote:
> 
> > mostly operations people (as opposed to credible engineers)?
> 
> If av8.net starts selling t-shirts, I'll take one with that phrase.

Perhaps a t-shirt should have this quote from Paul Vixie: describing the
IETF as "self-selected rabble and trolls"
http://www.ietf.org/mail-archive/web/ietf/current/msg25874.html Or later
in the same message, Vixie says "it's hard to commit acts of leadership
inside a burning movie theatre."  Which is just wrong. Its quite easy to
commit acts of leadership during an emergency. (the emergency being
spam) The problem was that Vixie was himself a spammer, false teaming
with anti-spammers and misleading network operators.  Of course, there
will be no such t-shirt, you are just using the notion of t-shirt to
misrepresent something I said.

I don't mean to say that network operators aren't credible, as you seem
to imply.  I definitely appreciate the craft skills very much. But craft
skills don't generally imply knowledge of theory and mathematics; actual
engineering.  I mean that Network operations staff have a history of
being easily misled by emotional appeals such as "the war won't be over
until the last spammer's head is stuck onto a spear at the city
limits."--Paul Vixie, Sept 1997. Although this really fired-up network
operations staff, it was later discovered that Vixie was a spammer.
Network operations staff however gave Vixie (MAPS/SORBS/SPAMHAUS)
anti-spam information on Whitehat's competition, while Whitehat was able
to avoid spam-traps; none of this would have been possible without the
support of the misled network operations staff. This draft is a similar
emotional appeal with insufficient basis in fact of number of attacks,
or in theory.


> > There is no harm in public resolvers.
> 
> Not to the people running the resolvers, usually, no.

There is "usually" no harm to anyone from open resolvers. No one has
reported any further attacks since this draft was conceived.  I note
that there have been no substantive answers to any of the questions I
raised, just platitudes and personal attacks.

> Has there been any subsequent attacks since the motivating attack was
> reported?
>
> Given that we now have some high-profile DNSSEC test zones (thanks to
> David Conrad), there is now no reason at all to use a recursor in a
> DDOS attack. One would merely make DNSSEC queries against a
> high-profile authority server.
>
> One can conduct attacks on well-known high-profile authority servers
> without the risk of exposure inherent in searching out reflectors.
>
> And I note that Paul Wouters previously asserted that 100:1
> amplification is a non-issue. If so, then certainly reflector attacks
> are also a non-issue for the same reason.
>
> So, this draft is in search of a problem to solve. However, closing
> open recursors may promote the sales of DNS servers to people who
> didn't need them before, so I wonder about that.  And can we expect to
> see people selling 'reflector blacklist' products to ISPs to block DNS
> to open recursors, merely because the recursors are open?  Will we see
> 'reflector blacklist' people scanning for open recursors?



-- 
Av8 Internet   Prepared to pay a premium for better service?
www.av8.net faster, more reliable, better service
617 344 9000   






___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Anycast was Re: Cache poisoning on DNSSEC

2008-09-02 Thread Joe Abley
Dean,

On 1 Sep 2008, at 20:57, Dean Anderson wrote:

> mostly operations people (as opposed to credible engineers)?

If av8.net starts selling t-shirts, I'll take one with that phrase.

> There is no harm in public resolvers.

Not to the people running the resolvers, usually, no.


Joe

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop