Re: What *are* they smoking? (fwd)

2003-09-16 Thread Yakov Shafranovich
Mea culpa, sorry.

[EMAIL PROTECTED] wrote:

On Tue, 16 Sep 2003 01:27:09 EDT, Yakov Shafranovich said:

The SMTP server is fake, take a look at this transaction:


Actually, that was my point.




Re: Stupid DNS tricks

2003-09-16 Thread Masataka Ohta
Adam Roach;

 Because this is probably a community of interest for the
 topic of DNS, I thought it would be worthwhile mentioning
 that Verisign has apparently unilaterally put in place
 wildcard DNS records for *.com and *.net. All unregistered
 domains in .com and .net now resolve to 64.94.110.11, which
 runs a Verisign-operated web search engine on port 80.

A very interesting stupidity.

However, as I checked whois database of verisign for *.com and
*.net, the answers are negative

No match for *.COM.

No match for *.NET.

that, according to verysign, they are not registered domain names.

So, I tried to get the names by myself, for obvious reasons :-),
through www.verisign.com. :-) But, my request was denied as

Please use only letters, numbers or dashes [-]. Do not
enter spaces, periods [.] or other punctuation.

that they are, according to verisign, not domain names open for
registration.

So, the remaining question is whether the stupidity is interesting
enough to make verisign not to be qualified to be a gtld registry
anymore or not.

Masataka Ohta



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Tim Chown
Because noone can stop them doing it, apparently...

On Tue, Sep 16, 2003 at 12:43:35AM -0400, Keith Moore wrote:
 so now verisign is deliberately misrepresenting DNS results.
 
 why are these people allowed to live?



Re: Stupid DNS tricks

2003-09-16 Thread Florian Weimer
Adam Roach [EMAIL PROTECTED] writes:

 Because this is probably a community of interest for the
 topic of DNS, I thought it would be worthwhile mentioning
 that Verisign has apparently unilaterally put in place
 wildcard DNS records for *.com and *.net. All unregistered
 domains in .com and .net now resolve to 64.94.110.11, which
 runs a Verisign-operated web search engine on port 80.

And SMTP on 25/TCP.

The current setup breaks setups like

example.com 86400   IN  MX  10 mail1.xeample.com
example.com 86400   IN  MX  20 mail2.example.com

Previously, MTAs could not resolve xeample.com and would therefore use
the secondary.  Now, they can, and get a 550 error on RCPT TO:.

Granted, the setup has always been erroneous and risky, but breaking
this without proper notice is still extremely annoying.



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Zefram
Today VeriSign is adding a wildcard A record to the .com and .net
zones.

This is, as already noted, very dangerous.  We in the IETF must work to
put a stop to this attempt to turn the DNS into a directory service,
and quickly.  I suggest the following courses of action, to be taken
in parallel and immediately:

0. Urgently publish an RFC (Wildcards in GTLDs Considered Harmful, or
   DNS Is Not A Directory) to provide a clear statement of the problem
   and to unambiguously prohibit the practice.

1. Via ICANN, instruct Verisign to remove the wildcard.

2. Some of us with sufficiently studly facilities should mirror the COM
   and NET zones, filtering out the wildcards.  Then the root zone can
   be modified to point at these filtered COM and NET nameservers.

3. Instruct ICANN to seek another organisation to permanently take over
   COM and NET registry services, in the event that Verisign do not
   comply with instructions to remove the wildcard.

I believe that the direct action I suggest in point 2 is necessary,
because we have previously seen the failure of the proper channels in
this matter, when Verisign added a wildcard for non-ASCII domain names.
Verisign have shown a disregard for the technical requirements of their
job, as well as displaying gross technical incompetence (particularly
in the wildcard SMTP server).  I believe Verisign have forfeit any moral
right to a grace period in which to rectify the situation.

-zefram
-- 
Andrew Main (Zefram) [EMAIL PROTECTED]



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Florian Weimer
Zefram [EMAIL PROTECTED] writes:

 1. Via ICANN, instruct Verisign to remove the wildcard.

By the way, what about .museum?



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Karl Auerbach

On Tue, 16 Sep 2003, Zefram wrote:

 ...  I suggest the following courses of action, to be taken
 in parallel and immediately:

 1. Via ICANN, instruct Verisign to remove the wildcard.

It isn't clear that this power is vested in ICANN.  There is a complicated
arrangement of Cooperative Agreements, MOUs, CRADAs, and Purchase Orders
that exist between various agencies of the US Department of Commerce
(including NTIA, NIST, and others) and ICANN and Verisign/NSI.

This web of agreements is sufficiently complicated that often really isn't
exactly clear who can compel Verisign/NSI on any particular point.  In
fact it may well be that the power may not exist.  Or it may take a lot of
legal dollars and time to press the issue.

To make the situation even less clear, there is, I believe, no statement
in the relevant Internet Standards docucuments that clearly rules out this
kind of wildcarding. (Yes, I think we can all agree that this particular
use of wildcarding *is* a bad thing, I'm simply pointing out that to those
who are not technically grounded in DNS matters, that without a clear
prohibition in the Internet Standards, the matter isn't so obvious.)

By-the-way, Neulevel (.us and .biz) did an experiment along these lines
back in May of this year.  It was short lived.  At the time I thought it
was a bad thing, and I still do.  And at the time I wrote and sent to the
ICANN board an evaluation of the risks of that experiment.

--karl--





Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Iljitsch van Beijnum
On dinsdag, sep 16, 2003, at 12:25 Europe/Amsterdam, Karl Auerbach 
wrote:

1. Via ICANN, instruct Verisign to remove the wildcard.

It isn't clear that this power is vested in ICANN.  There is a 
complicated
arrangement of Cooperative Agreements, MOUs, CRADAs, and Purchase 
Orders
that exist between various agencies of the US Department of Commerce
(including NTIA, NIST, and others) and ICANN and Verisign/NSI.

This web of agreements is sufficiently complicated that often really 
isn't
exactly clear who can compel Verisign/NSI on any particular point.  In
fact it may well be that the power may not exist.  Or it may take a 
lot of
legal dollars and time to press the issue.
I think the ICANN has no choice and has to show its teeth here, or just 
roll over and die because there no longer is a reason for its existence.

On a related note: so far I have never bothered to move my domains to a 
competing registrar before, but now seems a good time to do it. Can 
anyone recommend a procedure for select a good quality registrar? 
(Off-list if this is more appropriate.)




Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Kurt Erik Lindqvist
By-the-way, Neulevel (.us and .biz) did an experiment along these 
lines
back in May of this year.  It was short lived.  At the time I thought 
it
was a bad thing, and I still do.  And at the time I wrote and sent to 
the
ICANN board an evaluation of the risks of that experiment.

.nu have been doing this for a long time AFAIK.

- kurtis -




Re: Solving the right problems ...

2003-09-16 Thread Dave Crocker
Randall,

RRSh Now of course if the application wants to be aware, it can subscribe to
RRSh events that let it know that it happened.

That sounds remarkably like a presence service.

RRSh No, what it is is a socket call you make that subscribes do address
RRSh events on the socket.

oh.  ok.  I thought you were referring to a protocol issue, not a local
programming issue.

I suppose it is interesting that the language you used in your previous
statement could have either meaning.  Not sure _how_ it is interesting,
though...

d/
--
 Dave Crocker dcrocker-at-brandenburg-dot-com
 Brandenburg InternetWorking www.brandenburg.com
 Sunnyvale, CA  USA tel:+1.408.246.8253






Re: Solving the right problems ...

2003-09-16 Thread Keith Moore

   Now of course if the application wants to be aware, it can
   subscribe to events that let it know that it happened.
 
 That sounds remarkably like a presence service.
 
 No, what it is is a socket call you make that subscribes do address
 events on the socket. Thus when a peer adds and deletes an
 address you get a notification message up the socket buffer
 telling you that an address was added and one was deleted.

Both are needed.  That is, you need a way for the host IP stack to know
that a peer has moved to a different locator, and you need timely
notification that this has happened.  This is a lot like a presence
service, but it needs to operate at layer 3, and it needs to act in
response to sending IP packets to the old locators (polling a presence
server is either too slow or - if you do it often enough - too
wasteful).

And yes, you probably also need a socket call that the app can use to
ask that it be notified of changes in peers' locations, because
location changes can also result in changes in the level of service
available to the app. though hopefully most apps won't need to use it.

Keith





Re: Developing software for IETF/IRTF groups

2003-09-16 Thread Harald Tveit Alvestrand
Yakov,

there is a currently rather quiet list - [EMAIL PROTECTED] - which was 
supposed to discuss, among other things, software tools to support WG 
activities.

You might want to ask your question there.
I've heard of people using various sorts of document repositories, 
including CVS and WEBDAV, but have not heard of stuff developed 
specifically for IETF WGs.

   Harald



[Fwd: [Asrg] 7. Best Practices - Service Providers MTA Authors (was: Fwd: Verisign's New Change and Outdate RBL's)]

2003-09-16 Thread Yakov Shafranovich
Forwarding from the ASRG list, more anti-spam tools being broken by 
Verisign.

 Original Message 
Subject: [Asrg] 7. Best Practices - Service Providers  MTA Authors 
(was: Fwd: Verisign's New Change and Outdate RBL's)
Date: Tue, 16 Sep 2003 11:43:03 +0200
From: Brad Knowles [EMAIL PROTECTED]
To: IRTF ASRG [EMAIL PROTECTED]

Folks,

Just saw this on NANOG as well.  Looks like outdated anti-spam
configurations will now be turned into reject everything servers,
courtesy of Verisign/NetSOL.
Date: Tue, 16 Sep 2003 00:39:14 -0400
From: Patrick Muldoon [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Verisign's New Change and Outdate RBL's
Was playing with a test box here at home. Installed SpamAssassian 
from a newely cvsup'd ports tree on a FreeBSD box, and was surprised 
to see messages getting marked as received in blacklists that no 
longer exist.  Most noteably ORBS.  Since this was a fresh Install I 
hadn't gone through and removed the dead RBL's from 20_head_tests.cf 
yet.  Since dorkslayers doesn't exist. any queries for it are 
returning that infamous sitefinder address.

[EMAIL PROTECTED] doon]$ host  34.131.246.64.orbs.dorkslayers.com
34.131.246.64.orbs.dorkslayers.com has address 64.94.110.11
So anybody that hasn't update their SpamAssassian config, now has 
the added benefit of all ip's being tagged as an open relay.

Just an FYI
-Patrick




Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Dean Anderson
Is it any worse than IE taking you to msn search when a domain doesn't
resolve?  Or worse than Mozilla taking you to Netscape, duplicating a
Google search, and opening a sidebar (and a netscape search) you didn't
want?

I think it isn't.

And people shouldn't be using Reverse DNS for spam checks, either. This
has been hashed out on both DNSOP and Namedroppers.  People have known not
to do this for a long time, but some still insist on it. For that reason
alone, this is a good idea.

--Dean

On Tue, 16 Sep 2003, Keith Moore wrote:
 so now verisign is deliberately misrepresenting DNS results.

 why are these people allowed to live?






Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Zefram
Dean Anderson wrote:
Is it any worse than IE taking you to msn search when a domain doesn't
resolve?  Or worse than Mozilla taking you to Netscape, duplicating a
Google search, and opening a sidebar (and a netscape search) you didn't
want?

Yes, it is worse.  Much worse.  There is a fundamental difference between
this defaulting happening in the DNS and happening in a client program.
It is necessary that the wire protocols distinguish between existence and
non-existence of resources in a standard manner (NXDOMAIN in this case)
in order to give the client the choice of how to handle non-existence.
If IE wishes to default to doing a web search under those circumstances,
that is silly but harms no one else.  What Verisign has done pre-empts
that choice for everyone.

-zefram
-- 
Andrew Main (Zefram) [EMAIL PROTECTED]



Re: Spoofing and SCTP ADD-IP (was Re: Solving the right problems ...)

2003-09-16 Thread Randall R. Stewart (home)
Pekka Nikander wrote:

vinton g. cerf wrote:

We would also want to look very carefully at the potential spoofing 
opportunity that rebinding would likely introduce.

Randall R. Stewart (home) wrote:

This is one of the reasons the authors of ADD-IP have NOT pushed to 
get it done.. some more
work needs to be done on this area...


http://www.ietf.org/internet-drafts/draft-nikander-mobileip-v6-ro-sec-01.txt
is a background document, produced by the MIPv6 route optimization
security design team, that tries to explain the security desing
in MIPv6 RO.  I think that most of the threats and much of the solution
model would most probably apply also to SCTP ADD-IP and, of course,
also other multi-address multi-homing solutions.
--Pekka Nikander




IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6


Pekka:

Interesting reading.. I had heard of the RR check from someone but had
not researched it in detail.. nice document :
Now as to the applicability in SCTP and ADD-IP...

There is a difference with mobile-ip in that an SCTP association is already
established. Each node CN and MN have connection state. There has
been a 64bit random value exchanged and the ADD-IP which is equivialant
of the BU can be verified with this random state that the ends are
maintaining. The real issue shows up in that if you are worried about
an ease-dropper that can see the initial INIT/INIT-ACK exchange
between the two peers. In that case it would then have the 64bits of 
randomness
and could inject the false ADD/DEL that would hi-jack the association. Of
course it could do other things too like knock down your assocation as well
by sending a false ABORT chunk

It is good to see that the routing infrastructure is believed to be 
non-compromised
in MIP case. If we can make the same assumption then with one minor
tweak we can add a mechanism to SCTP to authenticate the ADD-IP with
private-public key pairs shared in the INIT/INIT-ACK. The obvious
problem with this would be if the infrastructure was compromised and you
had a true man in the middle who could intercept the INIT/INIT-ACK 
packets and
change the keys... but that goes away if we make the same assumption MIP 
did :

Michael Tuexen and I were working on a seperate draft for this.. and 
were also
somewhat concerned about the compromised routing structure too. If we don't
have to worry about that our job just got easier :

Thanks

R

--
Randall R. Stewart
[EMAIL PROTECTED] 815-342-5222 (cell phone)






Re: Spoofing and SCTP ADD-IP (was Re: Solving the right problems ...)

2003-09-16 Thread Jari Arkko
Randall R. Stewart (home) wrote:

Now as to the applicability in SCTP and ADD-IP...

There is a difference with mobile-ip in that an SCTP association is already
established. Each node CN and MN have connection state. There has
been a 64bit random value exchanged and the ADD-IP which is equivialant
of the BU can be verified with this random state that the ends are
maintaining. The real issue shows up in that if you are worried about
an ease-dropper that can see the initial INIT/INIT-ACK exchange
between the two peers. In that case it would then have the 64bits of 
randomness
and could inject the false ADD/DEL that would hi-jack the association. Of
course it could do other things too like knock down your assocation as well
by sending a false ABORT chunk
Yes. Unless you are encrypting the whole session, on-path attackers can
already do almost anything. They can start a session for you. They can
abort a session for you. They can hijack a session from you. They can
modify a session.
It is good to see that the routing infrastructure is believed to be 
non-compromised
in MIP case. If we can make the same assumption then with one minor
tweak we can add a mechanism to SCTP to authenticate the ADD-IP with
private-public key pairs shared in the INIT/INIT-ACK. The obvious
problem with this would be if the infrastructure was compromised and you
had a true man in the middle who could intercept the INIT/INIT-ACK 
packets and
change the keys... but that goes away if we make the same assumption MIP 
did :
The question you have to ask is: What is the difference between the
Internet as is and Internet with ADD-IP (or MIP). You can do the
analysis case by case, such as for plaintext communications and
for cryptographically protected communications and with or without
the compromised infrastructure. For instance, assuming plaintext
SCTP packets, presumably in the current Internet all on-path attackers
will be able launch the attacks I listed above. But I hope that
not everyone in the whole Internet will be able to e.g. disconnect SCTP
sessions from a given host. The same properties should stay if you
add a feature such as ADD-IP. On the other hand, if we assume that
the routing infrastructure is compromised, then even in the current
Internet I can go and intercept your plain sessions and cause all kinds
of interesting problems. I would allow this to happen even with ADD-IP,
as long as it does not make the problem worse.
With cryptographic protection (e.g. IPsec) on the SCTP packets,
you should be safe even from on-path attackers. Again, if you add
ADD-IP feature the same property should stay. Note that there are
some DoS attacks that remain regardless of cryptographic protection.
For instance, by interfering with ARP/ND you could block the flow
of packets.
--Jari






Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Keith Moore
 Is it any worse than IE taking you to msn search when a domain doesn't
 resolve? 

yes.  if an app that interfaces to humans masks the difference between an
invalid domain and a valid one, it only affects people who use that particluar
app.  however for other apps the difference between an invalid domain and a
valid one is significant.

verisign is masking the difference between a valid domain and NXDOMAIN for
all protocols, all users, and all software.





Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Spencer Dawkins
I agree with Zefram here, for at least a couple of reasons:

- there's a difference between doing this in infrastructure and
   doing this in a client program

- there's a difference between doing this in a scenario where
  there probably really IS a human in the loop (IE) and a
  scenario where there's no reason to think that a human is
  involved (trivially, an FTP running from cron on a Unix box)

- there's a difference between doing this in a component that
  can be replaced (IE) and one that is very difficult to replace
   in a meaningful way (DNS)

Not that I think IE's redirection is a GREAT example of the
Internet at its finest...

Spencer

- Original Message - 
From: Zefram [EMAIL PROTECTED]
To: Dean Anderson [EMAIL PROTECTED]
Cc: Keith Moore [EMAIL PROTECTED]; Yakov Shafranovich
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Tuesday, September 16, 2003 8:18 AM
Subject: Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To
Us]


 Dean Anderson wrote:
 Is it any worse than IE taking you to msn search when a domain
doesn't
 resolve?  Or worse than Mozilla taking you to Netscape, duplicating
a
 Google search, and opening a sidebar (and a netscape search) you
didn't
 want?

 Yes, it is worse.  Much worse.  There is a fundamental difference
between
 this defaulting happening in the DNS and happening in a client
program.
 It is necessary that the wire protocols distinguish between
existence and
 non-existence of resources in a standard manner (NXDOMAIN in this
case)
 in order to give the client the choice of how to handle
non-existence.
 If IE wishes to default to doing a web search under those
circumstances,
 that is silly but harms no one else.  What Verisign has done
pre-empts
 that choice for everyone.

 -zefram
 -- 
 Andrew Main (Zefram) [EMAIL PROTECTED]

 ___
 This message was passed through [EMAIL PROTECTED],
which is a sublist of [EMAIL PROTECTED] Not all messages are passed.
Decisions on what to pass are made solely by Raffaele D'Albenzio.




Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Edward Lewis
At 14:18 +0100 9/16/03, Zefram wrote:
Yes, it is worse.  Much worse.  There is a fundamental difference between
this defaulting happening in the DNS and happening in a client program.
It is necessary that the wire protocols distinguish between existence and
non-existence of resources in a standard manner (NXDOMAIN in this case)
in order to give the client the choice of how to handle non-existence.
Here we go with DNS, wild card synthesis and existence again... ;)

I think there are a few separate issues here.  One is understanding 
the role of 'name errors' (the original name of NXDOMAIN) and wild 
card synthesis in DNS.  The other is understanding the difference 
between DNS and registry contents.  The operational issue is the 
conditions under which the change was made.

As someone whose spent a lot of time studying DNS and currently is 
editing a DNSEXT WG document on the topic of wild cards, what is 
going on here is well within the protocol design of DNS.  I can't see 
an operational issue here either.

Having experience as the co-chair of PROVREG WG, I'd like to make a 
case that the DNS isn't the best means to determine if an object 
(even if it is a domain name) is registered - it's a first order 
guess but not the last word.  There are names registered that may not 
have working servers (hence suspended from the DNS to prevent lame 
delegations) or are otherwise reserved or suspended.  There are 
plenty of network address objects in use - in routing tables - that 
are not in the reverse DNS map.  So, to those who were relying on DNS 
for existence or legitimacy, perhaps they need to consider an 
alternate method.  (Namely something like whois or crisp.)

Operationally, at least the change was made on a Monday.  But given 
that there are other operational systems relying on the existing 
conditions, advance notice would have been a good idea.  In defense 
of not giving the advance notice, it's sometimes not clear who is 
impacted by a change because of the open nature of the Internet.

As someone who doesn't run spam tools (others do it for me), it 
wasn't obvious to me until reading the threads of the impact of the 
change on spam defenses.  I can understand how someone in the spam 
trenches would see the obvious impact, but be patient with others 
that are not in the trenches with you.

PS - With DNSSEC, you'll be able to distinguish between synthesized 
(wild card) answers and straight answers.  If you want to see DNSSEC 
because of this, get active in the the DNSEXT WG and help the effort 
along.

PPS - Maybe this will raise the need for the CRISP WG to develop a protocol.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer
Sponge Bob Square Pants?  I'm still trying to figure out the Macarena.



Fwd: Verisign attempt to take all unpaid addresses

2003-09-16 Thread Gene Gaines
Forwarded with Vittorio Bertola's permission.

I received a similar response from Izumi Aizu.

Gene Gaines
[EMAIL PROTECTED]
Sterling, Virginia USA


This is a forwarded message
From:  Vittorio Bertola [EMAIL PROTECTED]
To:Gene Gaines [EMAIL PROTECTED]
Date:  Tuesday, September 16, 2003, 9:17:46 AM
Subject: Verisign attempt to take all unpaid addresses
=Original message text===

Hello,

we've been working on this since the first rumours started to come up, see
http://forum.icann.org/mail-archive/alac/msg00385.html and following thread.
We will release a statement shortly.

Thanks for your support :-)

Regards,





On Tue, 16 Sep 2003 08:48:26 -0400, you wrote:

To:
ICANN Interim At-Large Advisory Committee:

  Erick Iriarte Ahon, Peru, Computer Law Specialist, [EMAIL PROTECTED]
  Izumi Aizu, Asia Network Research Researcher, [EMAIL PROTECTED]
  Vittorio Bertola, Italy, Technical manager, [EMAIL PROTECTED]
  Pierre Dandjinou. BENIN, ICT Policy Advisor, SURF/UNDP [EMAIL PROTECTED]
  Esther Dyson, USA, publisher/writer/IT investor/small business owner, [EMAIL 
 PROTECTED]
  Clement Dzidonu. GHANA, Dept Computer Science, Valley View Univ., [EMAIL PROTECTED]
  Xue Hong. Prof., Faculty of Law, U. Hong Kong, Prof., Foreign Affairs Coll., [EMAIL 
 PROTECTED]

I have a request of you, and I politely request individual answers
from each of you.

There are many many emails denouncing the new move by VeriSign
to hijack all unregistered addresses in the spaces they manage.

All unregistered domains in .com and .net now resolve to
64.94.110.11, a Verisign-operated web search engine on port 80
which reports advertiser-paid results.

If ICANN will not move immediately and aggressively here,
then it is a clear sign that organization is of no value,
and is in fact what ICANN is what Karl Auerbach has long
suspected the organization to be.

I ask that you immediately and publicly denounce this move
by VeriSign.

I ask that you issue statements both as an individual and as
a member of ICANN.  If you do not issue such statements, I
intend publicize widely your failure to do so.

It is time for you to take a stand.  Either you support the
Internet as it exists today, are you elect to be part of
the interests that are moving to destroy it.

I would like to know.

Gene Gaines
[EMAIL PROTECTED]
Sterling, Virginia USA
+1 703-433-2081


On Tuesday, September 16, 2003, 6:02:59 AM, Zefram wrote:

Today VeriSign is adding a wildcard A record to the .com and .net
zones.

 This is, as already noted, very dangerous.  We in the IETF must work to
 put a stop to this attempt to turn the DNS into a directory service,
 and quickly.  I suggest the following courses of action, to be taken
 in parallel and immediately:

 0. Urgently publish an RFC (Wildcards in GTLDs Considered Harmful, or
DNS Is Not A Directory) to provide a clear statement of the problem
and to unambiguously prohibit the practice.

 1. Via ICANN, instruct Verisign to remove the wildcard.

 2. Some of us with sufficiently studly facilities should mirror the COM
and NET zones, filtering out the wildcards.  Then the root zone can
be modified to point at these filtered COM and NET nameservers.

 3. Instruct ICANN to seek another organisation to permanently take over
COM and NET registry services, in the event that Verisign do not
comply with instructions to remove the wildcard.

 I believe that the direct action I suggest in point 2 is necessary,
 because we have previously seen the failure of the proper channels in
 this matter, when Verisign added a wildcard for non-ASCII domain names.
 Verisign have shown a disregard for the technical requirements of their
 job, as well as displaying gross technical incompetence (particularly
 in the wildcard SMTP server).  I believe Verisign have forfeit any moral
 right to a grace period in which to rectify the situation.

 -zefram

-- 
vb.   [Vittorio Bertola - v.bertola [a] bertola.eu.org]--
 http://bertola.eu.org/ - Archivio FAQ e molto altro... 


==End of original message text===


-- 
Gene 
[EMAIL PROTECTED]




Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Bruce Campbell
On Tue, 16 Sep 2003, Edward Lewis wrote:

 At 14:18 +0100 9/16/03, Zefram wrote:
 It is necessary that the wire protocols distinguish between existence and
 non-existence of resources in a standard manner (NXDOMAIN in this case)
 in order to give the client the choice of how to handle non-existence.

[ on dns not the best choice for authoritative non-existence ]

 are not in the reverse DNS map.  So, to those who were relying on DNS
 for existence or legitimacy, perhaps they need to consider an
 alternate method.  (Namely something like whois or crisp.)

I'm not sure whether thats a good idea.  The main fuss at the moment,
apart from Verisign acting without consultation, is that a lot of
automated software makes the assumption that 'NXDOMAIN' means 'Does Not
Exist'.  Adding the wildcard removes this assumption, and removes DNS as a
useful stateless low-overhead method of existence-verification.

For these items of software to change from using a stateless method of
existence-verification with low overhead, to using a semi-stateless method
of existence-verification with high overhead, is something akin to the Y2K
bug in scope, albeit without all the hype.

Operationally, having one's not-low-overhead whois server being hit by
automated queries solely for existence-verification is a terrible state of
affairs.

 PPS - Maybe this will raise the need for the CRISP WG to develop a protocol.

I can see a lot of people requesting a low-overhead stateless subset of
crisp/whois.

-- 
 Bruce Campbell  I speak for myself.




Re: [Fwd: [Asrg] 7. Best Practices - Service Providers MTA Authors (was: Fwd: Verisign's New Change and Outdate RBL's)]

2003-09-16 Thread Dean Anderson
The ORBS lookup is a problem with configuring invalid domains in spam
tools.  Someone else could have re-registered orbs.org, and taken control
of your email system.

This is just irresponsible configuration.

--Dean





Re: Careful with those spamtools.....

2003-09-16 Thread Dean Anderson
See, I get feedback from anti-spammers Last night, I got a bunch of
these...  Someone in australia is trying to get my address blacklisted by
spamming out emails forging my address.  I wonder who that could be?

--Dean


Received: from 61.88.124.155 ([210.124.48.16]) by
exchange2.the-leading-edge.com.au with Microsoft
SMTPSVC(5.0.2195.6713);
 Tue, 16 Sep 2003 20:53:25 +1000
from:mbc
Subject:  --
Content-Type:text/html
Content-Transfer-Encoding:7bit
Bcc:
Return-Path: [EMAIL PROTECTED]
Message-ID:
[EMAIL PROTECTED]
X-OriginalArrivalTime: 16 Sep 2003 10:53:25.0933 (UTC)
FILETIME=[C14D5DD0:01C37C40]
Date: 16 Sep 2003 20:53:25 +1000






Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Valdis . Kletnieks
On Tue, 16 Sep 2003 09:24:27 EDT, Keith Moore said:

 verisign is masking the difference between a valid domain and NXDOMAIN for
 all protocols, all users, and all software.

Out of curiosity, where did Verisign get the right to have the advertising monopoly
for all the eyeballs they'll attract with this?


pgp0.pgp
Description: PGP signature


Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Anthony Atkielski
Valdis writes:

 Out of curiosity, where did Verisign get the right
 to have the advertising monopoly for all the eyeballs
 they'll attract with this?

They didn't.

And there's even a way for individuals to stop it:  Type an incorrect
spelling for a famous trademark.  When Verisign puts up its own page for the
nonexistent domain, copy it and send it to the trademark owner, asking if he
intends to defend his trademark, or if he is releasing it to the public
domain.  In the former case, he'll have to take action against Verisign.
The latter case is unlikely unless he truly doesn't want the trademark,
because undefended trademarks are easily diluted and slip rapidly into the
public domain.  After Verisign has a few thousand lawsuits on its hands, it
will change its policy.




Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Dean Anderson
inline

On Tue, 16 Sep 2003, Bruce Campbell wrote:

 On Tue, 16 Sep 2003, Edward Lewis wrote:

  At 14:18 +0100 9/16/03, Zefram wrote:
  It is necessary that the wire protocols distinguish between existence and
  non-existence of resources in a standard manner (NXDOMAIN in this case)
  in order to give the client the choice of how to handle non-existence.

 [ on dns not the best choice for authoritative non-existence ]

  are not in the reverse DNS map.  So, to those who were relying on DNS
  for existence or legitimacy, perhaps they need to consider an
  alternate method.  (Namely something like whois or crisp.)

 I'm not sure whether thats a good idea.  The main fuss at the moment,
 apart from Verisign acting without consultation, is that a lot of
 automated software makes the assumption that 'NXDOMAIN' means 'Does Not
 Exist'.  Adding the wildcard removes this assumption, and removes DNS as a
 useful stateless low-overhead method of existence-verification.

Err, actually, its the opposite that they are assuming. They assume that
lack of an NXDOMAIN means the domain does exist. That is an invalid
assumption.

 For these items of software to change from using a stateless method of
 existence-verification with low overhead, to using a semi-stateless method
 of existence-verification with high overhead, is something akin to the Y2K
 bug in scope, albeit without all the hype.

The correct way to check for domain existance for email is to lookup an
MX record.

 Operationally, having one's not-low-overhead whois server being hit by
 automated queries solely for existence-verification is a terrible state of
 affairs.

One shouldn't be doing whois queries. One just wants to know if the domain
of the sender can receive email, back.

--Dean




Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Vernon Schryver
 From: [EMAIL PROTECTED] 

 Out of curiosity, where did Verisign get the right to have the advertising monopoly
 for all the eyeballs they'll attract with this?

What eyeballs?  I doubt I'm among the first 1,000,000 people to adjust
junk pop-op or other defenses to treat sitefinder.verisign.com and
64.94.110.0/24 like any other noxious web site.  If AOL and a lot of
other outfits haven't adjusted their proxies within a few hours, I'll
be surprised.

If AOL and Microsoft don't immediately make releases of IE and Netscape
that treat 64.94.110.11 the same as they treated an NXDOMAIN (and
included an update mechanism), it will only be because Verisign has
given up or they're gettting piece of Verisign's action.


Vernon Schryver[EMAIL PROTECTED]



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread James M Galvin

On Tue, 16 Sep 2003, Keith Moore wrote:

their mistake is in assuming that they can respond appropriately for
all ports - particularly when the association of applications with
known ports is only advisory, and many ports are open for arbitrary
use.

Agreed but this is overstating the issue since interoperability demands
we know which port is doing what and when.  What we needed was time to
either stop this before it happened or to deal with the implications.

in fact, a 550 response in SMTP is a different condition from NXDOMAIN,
and sometimes the difference is important - as the spam filter folks
have discovered.

Yes and this could be fixed with a new well-defined error code, which
brings us back to needing time to make an adjustment (or to have stopped
it from ever happening).

 Would have been nice to get
 some advance notice even if there are other TLDs that have been doing
 this for some time.

nice is not a word that seems to apply to forcing the entire net
to have to patch its applications and libraries just because
verisign decided to make inappropriate assertions about unregistered
domains.  that's like calling a mugger nice because he talks to
you politely while he takes your wallet at gunpoint.

Agreed but let's be fair.  Verisign was not first.  In fact, they are
almost 10th in the process.  Someone earlier (just today, sorry for not
looking back for the name) asked about .museum, which I've seen
references elsewhere to suggest it has in its contract with ICANN to
have this wildcard.  I have not confirmed this but undoubtedly someone
out there will know and provide a reference.

And there is the matter of the other TLDs that are already doing this
and have been doing it for some time.

None of this makes it right but let's focus on the issue not Verisign.
And the issue is with ICANN and convincing it that this is bad behavior
for all registries.  Verisign just made us all notice.

 It is worth noting that if we are to pass judgement against Verisign
 there are at least half-dozen other TLDs that blazed the trail.  We just
 overlooked them because of their size as compared to .NET and .COM.

not only their size, but their scope also.

What's the difference?  Their scope matters because of their size, or
vice versa.

Jim



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread James M Galvin

On Tue, 16 Sep 2003, Bill Sommerfeld wrote:

IMHO it was irresponsible of them to do this without several months
advance notice to allow authors of automated systems which depended
on NXDOMAIN queries to notice this and without a stable documented
way to reconstitute the NXDOMAIN they're suppressing.

Agreed although some might argue we had several months notice, albeit
quietly.  Verisign was far from being first at this.  It's just that
their size/scope made us all notice.

Jim



TLD Managers and Wildcard Ethics

2003-09-16 Thread dbotham

Verisign's recent inclusion of wildcard RR's for the .net and .com TLD's
does not violate any standards in the DNS that I can find, although it has
raised some interesting questions with regard to the ethical behavior or
TLD managers.


I think that managers of the TLD's should not be allow to use wild card
RR's in this manner.  I think there is a vast difference between a second
level domain name holder using a wildcard and a TLD manager using a
wildcard.  That differnce being that the TLD managers are custodians of
second level domain names and as such the public trusts that they will
manage that domain name space in a fair and equitable manner.  TLD managers
charge the public for the right to use second level domains.  They should
not be allow to profit from the use of unused second level domains.  I
believe that TLD managers should have to choose between profiting from
their registration services and profiting from the use of the domain name
space they are trusted to manage.

I am not saying that TLD manager's should not be allow to profit from
second level domains they register for themselves.  They should be free to
register any second level domain name they can legally register and use it
for whatever purpose they wish.  They should be specifically prohibited
from using all unregistered second level domains by virtue of the fact that
they can synthisise any second level domain name on the fly due to their
technical position in the resolution path.


David Botham





Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Yakov Shafranovich
James M Galvin wrote:
On Tue, 16 Sep 2003, Keith Moore wrote:

verisign is masking the difference between a valid domain and
NXDOMAIN for all protocols, all users, and all software.
If you read the Verisign documentation (which is quite excellent by the
way) on what they did and what they recommend you will see that they
thought about this.
In fact, the purpose of the Stubby SMTP daemon is to return a 550 for
non-existent recipient domains.
It is left as an exercise to the reader as to which is more efficient:
DNS NXDOMAIN or SMTP 550.
People, have you been reading the posts? The stubby SMTP daemon is not 
an SMTP server, it is simply a program that returns the following set of 
responses TO ANYTHING THAT IS PASSED TO IT.

--snip-
220 snubby2-wceast Snubby Mail Rejector Daemon v1.3 ready
blah
250 OK
blah
250 OK
blah
550 User domain does not exist.
blh
250 OK
blah
221 snubby2-wceast Snubby Mail Rejector Daemon v1.3 closing transmission 
channel
--snip-

That means that if the SMTP sender issues a RSET command after HELO, 
they will not get a 550 error code for the RCPT TO command, but rather 
for the MAIL FROM command as follows:

--snip-
220 snubby4-wceast Snubby Mail Rejector Daemon v1.3 ready
EHLO someone.com
250 OK
RSET
250 OK
MAIL FROM:[EMAIL PROTECTED]
550 User domain does not exist.
RCPT TO:[EMAIL PROTECTED]
250 OK
DATA
221 snubby4-wceast Snubby Mail Rejector Daemon v1.3 closing transmission 
channel
--snip-




Re: TLD Managers and Wildcard Ethics

2003-09-16 Thread Michael StJohns
Hi David -

An interesting point, but probably one better made to ICANN.  Try 
[EMAIL PROTECTED]  Since its not a standards or protocol issue its probably 
not an IETF issue.

Thanks - Mike



At 11:59 9/16/2003, [EMAIL PROTECTED] wrote:

Verisign's recent inclusion of wildcard RR's for the .net and .com TLD's
does not violate any standards in the DNS that I can find, although it has
raised some interesting questions with regard to the ethical behavior or
TLD managers.
I think that managers of the TLD's should not be allow to use wild card
RR's in this manner.  I think there is a vast difference between a second
level domain name holder using a wildcard and a TLD manager using a
wildcard.  That differnce being that the TLD managers are custodians of
second level domain names and as such the public trusts that they will
manage that domain name space in a fair and equitable manner.  TLD managers
charge the public for the right to use second level domains.  They should
not be allow to profit from the use of unused second level domains.  I
believe that TLD managers should have to choose between profiting from
their registration services and profiting from the use of the domain name
space they are trusted to manage.
I am not saying that TLD manager's should not be allow to profit from
second level domains they register for themselves.  They should be free to
register any second level domain name they can legally register and use it
for whatever purpose they wish.  They should be specifically prohibited
from using all unregistered second level domains by virtue of the fact that
they can synthisise any second level domain name on the fly due to their
technical position in the resolution path.
David Botham





Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Keith Moore
 their mistake is in assuming that they can respond appropriately
 for all ports - particularly when the association of applications
 with known ports is only advisory, and many ports are open for
 arbitrary use.
 
 Agreed but this is overstating the issue since interoperability
 demands we know which port is doing what and when. 

only the app (not the entire network) needs to know which port to use,
and this doesn't require that every port be assigned to a specific app.

 What we needed was time to
 either stop this before it happened or to deal with the implications.

what we need is a way to punish people who abuse the Internet.
personally I think drawing and quartering would be appropriate...

 in fact, a 550 response in SMTP is a different condition from
 NXDOMAIN, and sometimes the difference is important - as the spam
 filter folks have discovered.
 
 Yes and this could be fixed with a new well-defined error code

NO Jim.  VERISIGN DOES NOT HAVE THE RIGHT TO IMPOSE DISRUPTIVE CHANGE
ON THE INTERNET, not even with advance notice. 

 None of this makes it right but let's focus on the issue not Verisign.

Yes, let's focus on the issue.  But let's not ignore who is doing it
either.

What's wrong for VeriSign is wrong for the other TLD operators also. 
But Verisign causes much more harm by screwing COM and NET than the
operators of ccTLDs do.



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Yakov Shafranovich
Just to follow up on this - I just spoke to an engineer at Verisign and 
he informed me that the SMTP daemon is being replaced in a few hours 
with an RFC-compliant one. As for not giving a warning - this came from 
a higher policy level at Verisign and he is just an engineer.

Yakov

Yakov Shafranovich wrote:

James M Galvin wrote:

On Tue, 16 Sep 2003, Keith Moore wrote:

verisign is masking the difference between a valid domain and
NXDOMAIN for all protocols, all users, and all software.
If you read the Verisign documentation (which is quite excellent by the
way) on what they did and what they recommend you will see that they
thought about this.
In fact, the purpose of the Stubby SMTP daemon is to return a 550 for
non-existent recipient domains.
It is left as an exercise to the reader as to which is more efficient:
DNS NXDOMAIN or SMTP 550.


People, have you been reading the posts? The stubby SMTP daemon is not 
an SMTP server, it is simply a program that returns the following set of 
responses TO ANYTHING THAT IS PASSED TO IT.

--snip-
220 snubby2-wceast Snubby Mail Rejector Daemon v1.3 ready
blah
250 OK
blah
250 OK
blah
550 User domain does not exist.
blh
250 OK
blah
221 snubby2-wceast Snubby Mail Rejector Daemon v1.3 closing transmission 
channel
--snip-

That means that if the SMTP sender issues a RSET command after HELO, 
they will not get a 550 error code for the RCPT TO command, but rather 
for the MAIL FROM command as follows:

--snip-
220 snubby4-wceast Snubby Mail Rejector Daemon v1.3 ready
EHLO someone.com
250 OK
RSET
250 OK
MAIL FROM:[EMAIL PROTECTED]
550 User domain does not exist.
RCPT TO:[EMAIL PROTECTED]
250 OK
DATA
221 snubby4-wceast Snubby Mail Rejector Daemon v1.3 closing transmission 
channel
--snip-






Re: TLD Managers and Wildcard Ethics

2003-09-16 Thread Keith Moore
 An interesting point, but probably one better made to ICANN.  Try 
 [EMAIL PROTECTED]  Since its not a standards or protocol issue its
 probably not an IETF issue.

I disagree that this is not a protocol issue, as it certainly affects
operation of protocols.  There are probably issues for the DNS protocols
also - if nothing else it may be that some claification of the
specification is needed. 

It can be quite reasonable to make wildcard assertions about RRs that
are all within the same administrative domain, but arguably this
condition is not met for the COM or NET zones.



Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Keith Moore
  It is necessary that the wire protocols distinguish between
  existence and non-existence of resources in a standard manner
  (NXDOMAIN in this case) in order to give the client the choice of
  how to handle non-existence.
 
 [ on dns not the best choice for authoritative non-existence ]

it's hard to imagine that there's a better oracle than DNS to ask about
the (non-) existence of a DNS name.

now to assume that the DNS name is bound to anything in particular,
like a host, or a particular business concern, that would be a stretch.



Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Keith Moore
 Having experience as the co-chair of PROVREG WG, I'd like to make a 
 case that the DNS isn't the best means to determine if an object 
 (even if it is a domain name) is registered - it's a first order 
 guess but not the last word. 

I strongly disagree.  The DNS is the ultimate authority on whether a
domain exists, since the way you create a domain is by making an entry
in the DNS.Making existence of a domain depend on a separate
registry makes no sense and is inconsistent with longstanding practice.

What's happening here is that the COM and NET zones were supposed to
reflect their respective registries, but Verisign is adding records to
the DNS that are not in the registry.  This is fraud.

 There are 
 plenty of network address objects in use - in routing tables - that 
 are not in the reverse DNS map. 

that's not the same thing at all.  DNS is not the authority for whether
a device is connected to the net.  DNS is the authority on whether a DNS
name exists.



Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread David Morris


On Tue, 16 Sep 2003, Bruce Campbell wrote:


 Operationally, having one's not-low-overhead whois server being hit by
 automated queries solely for existence-verification is a terrible state of
 affairs.

Has anyone tried Verisign's whois server ... at least their 'web'
interface which is impractical to automate access to because of a
fuzzy image which a human or similar of visual discernment must
read?




Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Edward Lewis
At 13:12 -0400 9/16/03, Keith Moore wrote:
I strongly disagree.  The DNS is the ultimate authority on whether a
domain exists, since the way you create a domain is by making an entry
in the DNS.Making existence of a domain depend on a separate
registry makes no sense and is inconsistent with longstanding practice.
DNS is the ultimate authority on whether there is an DNS answer to a 
DNS query, but that's about it.  What a DNS server answers is based 
on what is in the registry it represents.

To quote what I wrote on the provreg list in
   http://www.cafax.se/ietf-provreg/maillist/2001-09/msg00164.html:
DNS names [...] are limited to 255 octets, which is about 2K bits, 
and 2^2k possibilities minus special cases.  Boom - all names exist.

The point is, before saying that DNS makes any statement about 
existence you need to define exists for what purpose.  In the 
message above, it was exists so that I can't register it.  In the 
wcard clarify draft in DNSEXT, it's exists for the purposes of 
ruling out synthesis of the answer.

that's not the same thing at all.  DNS is not the authority for whether
a device is connected to the net.  DNS is the authority on whether a DNS
name exists.
In engineering the DNS, com. has been and still is a peculiar case 
and there has been the temptation to tailor the DNS protocol to 
accommodate it.  The community has said time and again not to do so - 
not to treat that zone (and the others growing like it) as special 
cases.  I think turnabout is fair play - that we not restrict com. 
and the others from using what's in DNS protocol.

I'm neither endorsing nor criticizing what has been added to com. 
and net.  Let's just be fair, accurate, and on-topic (like, 
protocols) in the discussion.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer

Sponge Bob Square Pants?  I'm still trying to figure out the Macarena.



Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Edward Lewis
At 11:01 -0400 9/16/03, Dean Anderson wrote in response to Bruce Campbell:
Err, actually, its the opposite that they are assuming. They assume that
lack of an NXDOMAIN means the domain does exist. That is an invalid
assumption.
Using DNS to determine existence is a decent heuristic, but it isn't 
exact.  That's my point, in summary.  (IOW - we agree.)

One shouldn't be doing whois queries. One just wants to know if the domain
of the sender can receive email, back.
I was assuming that the check was done to see if the mail could be 
traced back - from claimed source address to domain name to 
registrant.  Of course, with spoofing, nothing can be trusted, but if 
it is legit, you should be able to check it out.

If the case is just to see if mail can go back, then yeah, there 
oughta be an MX.
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer

Sponge Bob Square Pants?  I'm still trying to figure out the Macarena.



Re: TLD Managers and Wildcard Ethics

2003-09-16 Thread Michael StJohns


Hi Keith -

At 12:56 9/16/2003, Keith Moore wrote:
 An interesting point, but
probably one better made to ICANN. Try 
 [EMAIL PROTECTED] Since its not a standards or protocol issue
its
 probably not an IETF issue.
I disagree that this is not a protocol issue, as it certainly
affects
operation of protocols. There are probably issues for the DNS
protocols
also - if nothing else it may be that some claification of the
specification is needed. 
I agree that there may be protocol issues, but the email specifically
went:

I think that managers of the TLD's should not be allow to use wild
card
RR's in this manner. 
The remainder of the email was in the same vein. That's an
operational or policy issue best addressed elsewhere - and when resolved
we should take a whack at the protocol implications. E.g. how do we
get the protocol to enforce the policy or does the policy break the
robustness principle, etc..

It can be quite reasonable to make
wildcard assertions about RRs that
are all within the same administrative domain, but arguably this
condition is not met for the COM or NET zones.
Agreed - but again, unless it breaks the protocol or has an adverse
impact on robustness, (and not just some number of bottom lines) its
probably better to resolve the policy issue before putting fingers on the
protocol.
If someone wants to bang on DNS absent policy discussions - this may be
the right place to start, with a very quick trip to namedroppers once the
relevance was established.
My $.02...
Mike





Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread James M Galvin

On Tue, 16 Sep 2003, Keith Moore wrote:

 their mistake is in assuming that they can respond appropriately
 for all ports - particularly when the association of applications
 with known ports is only advisory, and many ports are open for
 arbitrary use.

 Agreed but this is overstating the issue since interoperability
 demands we know which port is doing what and when.

only the app (not the entire network) needs to know which port to use,
and this doesn't require that every port be assigned to a specific
app.

You can't have it both ways.  Either the app is so widespread that the
port in use is at least a de facto standard or it is a de jure
standard.  Either way it is possible to respond appropriately.  And
there aren't that many apps that fall into this category.

But I do agree that in the general case there are a lot of ports to
worry about.  I just don't think the general case is a practical
concern.  So perhaps we just disagree?

 in fact, a 550 response in SMTP is a different condition from
 NXDOMAIN, and sometimes the difference is important - as the spam
 filter folks have discovered.

 Yes and this could be fixed with a new well-defined error code

NO Jim.  VERISIGN DOES NOT HAVE THE RIGHT TO IMPOSE DISRUPTIVE CHANGE
ON THE INTERNET, not even with advance notice.

I'm not so sure.  Others on this list and other lists, some more
qualified than I, have been asserting there are no rules -- technical or
otherwise -- to prevent Verisign and others from doing what they've
done.  Oh we can certainly debate philosophical positions like do not
harm,  but what exactly is the disruption here?

Correct me if I'm wrong, the principle disruption -- and I want to
emphasize disruption here -- I've seen is that a particular spam
indicator no longer works as expected.  Is there more to this than that?
Okay, yes, there may be technical DNS issues but it is still not
disruptive to the Internet infrastructure in general as far as I can
tell.

There seems to be no shortage of reasons to dislike the behavior but
what exactly has been disrupted?

 None of this makes it right but let's focus on the issue not Verisign.

Yes, let's focus on the issue.  But let's not ignore who is doing it
either.

Ignore, no.  But let's not start Verisign bashing either.

What's wrong for VeriSign is wrong for the other TLD operators also.
But Verisign causes much more harm by screwing COM and NET than the
operators of ccTLDs do.

But what exactly is the screw here?

Jim



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Vernon Schryver
 From: James M Galvin [EMAIL PROTECTED]

 ...
 Correct me if I'm wrong, the principle disruption -- and I want to
 emphasize disruption here -- I've seen is that a particular spam
 indicator no longer works as expected.  Is there more to this than that?
 ...

The list I've seen is:

 - failing to reject spam based on NXDOMAIN for the envelope sender.
 (What you term the principle disruption)

 - rejecting legitimate mail because some long dead DNS-based
 blacklists are suddenly resolving  

 - HTTP spiders will fetch Verisign's robots.txt a lot as they
find bogus domains (e.g. typos in HREFs) resolving.

 - HTTP users see a stalled screen instead of an error message as
their browsers wait for Verisign's overloaded HTTP server to
deliver its advertising.


Vernon Schryver[EMAIL PROTECTED]



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Valdis . Kletnieks
On Tue, 16 Sep 2003 15:19:47 EDT, James M Galvin said:

 But what exactly is the screw here?

Verisign was (as far as I knew) given *stewardship* of the .com and .net zones
as a public trust.  I don't see anywhere they were given the right to use their
stewardship to try to make money selling typo eyeballs.  (And note that unless
you do something *really* ugly like round-robin the wildcards, only one
organization can do this per TLD - so they're essentially abusing their
monopoly).

So the question boils down to:  Are they owners of .com, or merely caretakers?



pgp0.pgp
Description: PGP signature


Re: TLD Managers and Wildcard Ethics

2003-09-16 Thread Keith Moore
 It can be quite reasonable to make wildcard assertions about RRs that
 are all within the same administrative domain, but arguably this
 condition is not met for the COM or NET zones.
 
 Agreed - but again, unless it breaks the protocol or has an adverse impact 
 on robustness, (and not just some number of bottom lines) its probably 
 better to resolve the policy issue before putting fingers on the protocol.

As convenient as it might be to find an excuse to keep IETF out of this
I don't think we can meaningfully separate discussions about the DNS
protocol from discussions about DNS semantics.

That, and we've put up with too much abuse from VeriSign for too long.




Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Anthony Atkielski
Jim writes:

 Correct me if I'm wrong, the principle disruption -- and I want to
 emphasize disruption here -- I've seen is that a particular spam
 indicator no longer works as expected.  Is there more to this than that?

You could make many random DNS requests of a DNS server and flush the cache,
producing a partial denial of service (or at least a drop in performance).
If every single request for a domain produces an address, existent or not,
it takes up more continuing resources than a request that produces an error.
No?




Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Keith Moore
 only the app (not the entire network) needs to know which port to
 use, and this doesn't require that every port be assigned to a
 specific app.
 
 You can't have it both ways.  Either the app is so widespread that the
 port in use is at least a de facto standard or it is a de jure
 standard. 

False.  Many ports have neither a de factor nor a de jure assignment.

 Either way it is possible to respond appropriately. 

False.  As I pointed out earlier, there is no SMTP respose which is
equivalent to this domain does not exist.  Furthermore there are
failure modes associated with the wildcard MX record that do not
exist if the server returns NXDOMAIN.  For instance, if their SMTP
server is down or unreachable (as it might be from time to time), the
sender will keep retrying to send the message when it should have failed
immediately with NXDOMAIN.

Frankly, your apologies for Verisign's abuse aren't very credible.
The only appropriate response to this situation is to punish Verisign.

 But I do agree that in the general case there are a lot of ports to
 worry about.  I just don't think the general case is a practical
 concern.  So perhaps we just disagree?

Perhaps.   I actually care about preserving the Internet's ability to
support a wide variety of applications.  So arguments of the form
it works for the web and email, therefore the practical concerns
are taken care of don't wash.  Particularly when it doesn't even 
do the right thing for either the web or email.  Hint: just because
the protocol is HTTP doesn't mean that the client has a human 
typing URLs in and looking at the output.


 
  in fact, a 550 response in SMTP is a different condition
  from NXDOMAIN, and sometimes the difference is important -
  as the spam filter folks have discovered.
 
  Yes and this could be fixed with a new well-defined error code
 
 NO Jim.  VERISIGN DOES NOT HAVE THE RIGHT TO IMPOSE DISRUPTIVE
 CHANGE ON THE INTERNET, not even with advance notice.
 
 I'm not so sure.  Others on this list and other lists, some more
 qualified than I, have been asserting there are no rules -- technical
 or otherwise -- to prevent Verisign and others from doing what they've
 done.  

Nothing gives VeriSign the right to misrepresent the contents of the
registry.  If it's wrong for businesses to register individual
misspelled domain names in the hopes of getting misspelled queries
redirected to their sites, it is surely wrong for VeriSign to do the
same thing for ALL unregistered domains within COM and NET.

 Oh we can certainly debate philosophical positions like do not
 harm,  but what exactly is the disruption here?

Have you not been paying attention?  When you try to download a web page
that doesn't exist, you don't get a host does not exist error, you get
a redirect to a web page.  That's fraud.   When you try to verify that a
domain is valid, you don't get NXDOMAIN, you get an A record.  That's
also fraud.  When you try to talk to another port, you get connection
refused, so instead of getting the error that corresponds to no such
host you'll probably think it is a temporary error (say, the server is
down) and try again later.

It is a gross protocol violation to take an explicit error indication
that has a very specific meaning and instead map it to what in some
cases looks like valid output, and in other cases looks like a very
different kind of error.

 Correct me if I'm wrong, the principle disruption -- and I want to
 emphasize disruption here -- I've seen is that a particular spam
 indicator no longer works as expected. 

You are wrong.  

 Okay, yes, there may be technical DNS issues but it is still not
 disruptive to the Internet infrastructure in general as far as I can
 tell.

It's broken the ability to detect misspelled domains for every
application and every protocol, for every name under .COM or .NET.  


 Yes, let's focus on the issue.  But let's not ignore who is doing
 it either.
 
 Ignore, no.  But let's not start Verisign bashing either.

It's not bashing them to speak the truth about what they are doing.

Keith



Re: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Keith Moore
 At 13:12 -0400 9/16/03, Keith Moore wrote:
 I strongly disagree.  The DNS is the ultimate authority on whether a
 domain exists, since the way you create a domain is by making an
 entry in the DNS.Making existence of a domain depend on a
 separate registry makes no sense and is inconsistent with
 longstanding practice.
 
 DNS is the ultimate authority on whether there is an DNS answer to a 
 DNS query, but that's about it.  What a DNS server answers is based 
 on what is in the registry it represents.

What a DNS server answers is based on what is in the zone it represents.
Not all zones have registries.

 To quote what I wrote on the provreg list in
 http://www.cafax.se/ietf-provreg/maillist/2001-09/msg00164.html:
 
 DNS names [...] are limited to 255 octets, which is about 2K bits, 
 and 2^2k possibilities minus special cases.  Boom - all names exist.

You didn't actually cite any support for your statement.  And the
existence of the NXDOMAIN response code contradicts that statement.

 The point is, before saying that DNS makes any statement about 
 existence you need to define exists for what purpose.

That's beside the point.  NXDOMAIN is still a meaningful condition even
though you can't tell what a domain means if it does exist.

 that's not the same thing at all.  DNS is not the authority for
 whether a device is connected to the net.  DNS is the authority on
 whether a DNS name exists.
 
 In engineering the DNS, com. has been and still is a peculiar case 
 and there has been the temptation to tailor the DNS protocol to 
 accommodate it.  The community has said time and again not to do so - 
 not to treat that zone (and the others growing like it) as special 
 cases.  I think turnabout is fair play - that we not restrict com. 
 and the others from using what's in DNS protocol.

It is never appropriate to make wildcard assertions about names within a
zone if those assertions are not true.  If all of the names in
foo.example.com zone will always be associated with address a.b.c.d,
it's reasonable to set up a wildcard A record for that zone.  Otherwise
it is not reasonable. This is no less true for com or net than for
foo.example.com 

COM and NET are supposed to reflect their respective registries - this
isn't itself a DNS protocol issue but part of the arrangement for
managing those zones.  VeriSign is making assertions about names that
don't exist in the registries.  (It also happens that those assertions
are disruptive to the operation of protocols when those protocols use
names in those zones, and that *is* a protocol issue)

Keith





Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Paul Vixie
 By the way, what about .museum?

.museum does not delegate all of its subdomains.

not all tld's are delegation-only.
-- 
Paul Vixie



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread James M Galvin

On Tue, 16 Sep 2003 [EMAIL PROTECTED] wrote:

 But what exactly is the screw here?

Verisign was (as far as I knew) given *stewardship* of the .com and
.net zones as a public trust.  I don't see anywhere they were given
the right to use their stewardship to try to make money selling typo
eyeballs.  (And note that unless you do something *really* ugly like
round-robin the wildcards, only one organization can do this per TLD
- so they're essentially abusing their monopoly).

So the question boils down to: Are they owners of .com, or merely
caretakers?

An excellent question!  But that is a discussion that belongs with
ICANN, not the IETF.

Jim



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread David Morris


On Tue, 16 Sep 2003, Vernon Schryver wrote:

  From: James M Galvin [EMAIL PROTECTED]

  ...
  Correct me if I'm wrong, the principle disruption -- and I want to
  emphasize disruption here -- I've seen is that a particular spam
  indicator no longer works as expected.  Is there more to this than that?
  ...

 The list I've seen is:

One more I've seen mentioned today ... an incorrect MX record which refers
to a non-existant domain will/may no longer properly fail over to an
alternate lower priority MX entry.


  - failing to reject spam based on NXDOMAIN for the envelope sender.
  (What you term the principle disruption)

  - rejecting legitimate mail because some long dead DNS-based
  blacklists are suddenly resolving

  - HTTP spiders will fetch Verisign's robots.txt a lot as they
 find bogus domains (e.g. typos in HREFs) resolving.

  - HTTP users see a stalled screen instead of an error message as
 their browsers wait for Verisign's overloaded HTTP server to
 deliver its advertising.




ICANN At-Large Advisory Committee response to Verisign SiteFinder

2003-09-16 Thread Gene Gaines
This is a forwarded message
From:  Vittorio Bertola [EMAIL PROTECTED]
To:Gene Gaines [EMAIL PROTECTED]
Date:  Tuesday, September 16, 2003, 2:06:02 PM
Subject: Verisign attempt to take all unpaid addresses
=Original message text===

=
The At-Large Advisory Committee would like to bring to ICANN's
attention concerns about Verisign's surprising roll-out of the
SiteFinder service for .com and .net.  

SiteFinder works by re-directing queries for non-existing domain
names to the IP address of a search service that is being run by
Verisign.

This practice raises grave technical concerns, as it de facto
removes error diagnostics from the DNS protocol, and replaces them
by an error handling method that is tailored for HTTP, which is just
one of the many Internet protocols that make use of the DNS. We will
leave it for others to explain the details of these concerns, but
note that returning resource records in a way which is countrary to
the very design of the DNS certainly does not promote the stability
of the Internet.

These concerns are not mitigated by Verisign's efforts to work
around the consequences of breaking the Internet's design on a
service-by-service basis: These workarounds make specific
assumptions on the conclusions that Internet software would be
drawing from nonexisting domain names; these assumptions are not
always appropriate.

When working as intended, the service centralizes error handling
decisions at the registry that are rightly made in application
software run on users' computers.  Users are deprived of the
opportunity to chose those error handling strategies best suited for
their needs, by chosing appropriate products available on a
competitive marketplace. Software makers are deprived of the
opportunity to compete by developing innovative tools that best
match the user's needs.

We urge ICANN to take whatever steps are necessary to stop this
service.
-- 
vb.  [Vittorio Bertola - vb [at] bertola.eu.org]---
--- http://bertola.eu.org/ ---

==End of original message text===

-- 




typo wildcard I-D

2003-09-16 Thread Zefram
I've just submitted an Internet-Draft concerning the wildcard issue.
For those who can't wait for it to appear in the internet-drafts
directory, http://www.fysh.org/~zefram/typo_wcard/.

-zefram
-- 
Andrew Main (Zefram) [EMAIL PROTECTED]



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Rick Wesson

 An excellent question!  But that is a discussion that belongs with
 ICANN, not the IETF.

 Jim

Jim,

that would be true if the ICANN were functioning and this event is just
proof that the ICANN does not function.

the mission of ICANN (my paraphrase) is Technical Administration of
Internet ?N?ames and Numbers

It is ovious to anyone today, that there is no technical oversite of the
DNS today.


-rick






Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Jaap Akkerhuis


So the question boils down to: Are they owners of .com, or merely
caretakers?

An excellent question!  But that is a discussion that belongs with
ICANN, not the IETF.

Nearly my reaction as well. Note, using the concept of ownership
has/will get quite some lawyers debating.

Some (rhetoric) questions:
If there is a caretaker, who is the owner of what is taken
care of?  Under which law system?

jaap



Re: Stupid DNS tricks

2003-09-16 Thread Masataka Ohta
Any comment on the attached draft ID?

Abstract

   This memo describes actions against broken content of a primary
   server of a TLD.  Without waiting for an action of some, if any,
   central authority, distributed actions TLD server operators and ISPs
   can settle the issue, for a short term.

Masataka Ohta
---






INTERNET DRAFT   M. Ohta
draft-ohta-broken-tld--1.txt   Tokyo Institute of Technology
  September 2003

 Distributed Actions Against Broken TLD

Status of this Memo

   This document is an Internet-Draft and is subject to all provisions
   of Section 10 of RFC2026.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as work in progress.

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/1id-abstracts.html The list of Internet-Draft
   Shadow Directories can be accessed at http://www.ietf.org/shadow.html

Abstract

   This memo describes actions against broken content of a primary
   server of a TLD.  Without waiting for an action of some, if any,
   central authority, distributed actions TLD server operators and ISPs
   can settle the issue, for a short term.

1. Introduction

   DNS is a fully distributed database of domain names and their
   associated values with loose integrity.

   However, the primary server of a zone is a single point of failure of
   the zone to hold the current most copy of the zone and such a failure
   at TLD can cause a lot of damage to the Internet.

   As it may take time for a central authority, if any, take care of the
   problem, this memo describes distriburted actions as a short term
   solution to protect the Internet against broken TLD zone content.

   The long term solution is to let the primary server operator fix the
   content or to change the primary server operator, which may involve a
   central authority.



M. OhtaExpires on March 17, 2004[Page 1]

INTERNET DRAFT Broken TLD  June 2003


   Similar technique is applicable to root servers with broken contents.

2. Actions of TLD Server Operators

   A TLD server operator who have found that TLD zone content is broken
   should disable zone transfer and use a copy of old zone content known
   not to be broken.

   Or, if the fix for the zone content is obvious and easy, the operator
   may manually or automatically edit the content of the current most
   one without updating SOA serial number. In this case, zone transfer
   may not be disabled, though actions of ISPs described in section 3
   may make the transfer from servers of broken content impossible.

3. Actions of ISPs

   ISPs should disable routes to TLD servers with broken content and/or
   filter packets to/from the TLD servers.

   ISPs should periodically check the servers, whether they still
   contain broken content or not.

4. Security Considerations

   As for security, TLD servers should never have broken content.

5. Author's Address

   Masataka Ohta
   Graduate School of Information Science and Engineering
   Tokyo Institute of Technology
   2-12-1, O-okayama, Meguro-ku, Tokyo 152-8552, JAPAN

   Phone: +81-3-5734-3299
   Fax: +81-3-5734-3299
   EMail: [EMAIL PROTECTED]















M. OhtaExpires on March 17, 2004[Page 2]




RE: [Fwd: [Asrg] Verisign: All Your ...

2003-09-16 Thread Sabharwal, Atul
Are there just a couple of DNS server(s) per ISP?  Do they run VPN's to
sync up with the central DNS servers so that DNS spoofing is limited 
DNS synchronization encrypted?

Should be an easy solution for DNS spoofing except for public IP
addresses which home users get.  Again, they would be registered, so
spoofing them would be difficult?

--
Atul

P.S: The opinions are my opinion and my responsibility.

-Original Message-
From: Edward Lewis [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, September 16, 2003 11:19 AM
To: [EMAIL PROTECTED]
Cc: Edward Lewis
Subject: Re: [Fwd: [Asrg] Verisign: All Your ...

At 13:12 -0400 9/16/03, Keith Moore wrote:
I strongly disagree.  The DNS is the ultimate authority on whether a
domain exists, since the way you create a domain is by making an entry
in the DNS.Making existence of a domain depend on a separate
registry makes no sense and is inconsistent with longstanding practice.

DNS is the ultimate authority on whether there is an DNS answer to a 
DNS query, but that's about it.  What a DNS server answers is based 
on what is in the registry it represents.

To quote what I wrote on the provreg list in
http://www.cafax.se/ietf-provreg/maillist/2001-09/msg00164.html:

DNS names [...] are limited to 255 octets, which is about 2K bits, 
and 2^2k possibilities minus special cases.  Boom - all names exist.

The point is, before saying that DNS makes any statement about 
existence you need to define exists for what purpose.  In the 
message above, it was exists so that I can't register it.  In the 
wcard clarify draft in DNSEXT, it's exists for the purposes of 
ruling out synthesis of the answer.

that's not the same thing at all.  DNS is not the authority for whether
a device is connected to the net.  DNS is the authority on whether a
DNS
name exists.

In engineering the DNS, com. has been and still is a peculiar case 
and there has been the temptation to tailor the DNS protocol to 
accommodate it.  The community has said time and again not to do so - 
not to treat that zone (and the others growing like it) as special 
cases.  I think turnabout is fair play - that we not restrict com. 
and the others from using what's in DNS protocol.

I'm neither endorsing nor criticizing what has been added to com. 
and net.  Let's just be fair, accurate, and on-topic (like, 
protocols) in the discussion.
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis+1-703-227-9854
ARIN Research Engineer

Sponge Bob Square Pants?  I'm still trying to figure out the Macarena.




Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Keith Moore
interesting point.  if we created a new gTLD and announced that it would be
wildcarded from day one, it wouldn't be used in the same way as the other
gTLDs.

then again, do we really want different ways of reporting errors for 
different zones in the DNS?  would apps then want to special-case 
certain zones to interpret their results differently than the others?

Keith

 when people started beating on my phone ringer about wildcards yesterday
 evening, and screaming for patches to bind to somehow make it all better,
 i asked but other tld's do this, what's the big deal?  as near as i can
 figure it, the problem is one of expectation.  if someone signs up for .nu
 they know there'll be a wildcard there before they sign, and they can take
 appropriate precautions (like only using it for web or e-mail, and not
 naming hosts under that tld).  the expectations for .com and .net to not
 have wildcards were all set many years ago, and it's the violation of those
 expectations that's got people angry enough to publish patchware about it.



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Paul Vixie
 % Blech.
 % 
 % If it's Tuesday, this must be .belgium?
 % 
 % A non-starter.  *MAYBE* if it were a different RR with different semantics.
 
   This may be exactly what we get w/ a patch from ISC.
   If BIND is offically tweeked so that some zone cuts are 
   allowed to exercise legal protocol options while others 
   are not...  changes based on mob rule... not good.

as bill must surely know, we would never do that.

   BIND begins to lose its reputation as a reference 
   implementation of open standards.

i certainly hope not.



Re: [Fwd: [Asrg] Verisign: All Your Misspelling Are Belong To Us]

2003-09-16 Thread Bill Manning
% On Wed, 17 Sep 2003 00:00:14 EDT, Keith Moore said:
% 
%  then again, do we really want different ways of reporting errors for 
%  different zones in the DNS?  would apps then want to special-case 
%  certain zones to interpret their results differently than the others?
% 
% Blech.
% 
% If it's Tuesday, this must be .belgium?
% 
% A non-starter.  *MAYBE* if it were a different RR with different semantics.
% 

This may be exactly what we get w/ a patch from ISC.
If BIND is offically tweeked so that some zone cuts are 
allowed to exercise legal protocol options while others 
are not...  changes based on mob rule... not good.

BIND begins to lose its reputation as a reference 
implementation of open standards.

Ick.

--bill
Opinions expressed may not even be mine by the time you read them, and
certainly don't reflect those of any other entity (legal or otherwise).