[dnsop] Re: WGLC for draft-ietf-dnsop-reflectors-are-evil-02.txt

2006-11-14 Thread Stephane Bortzmeyer
On Thu, Nov 09, 2006 at 03:59:13PM +0200, Pekka Savola [EMAIL PROTECTED] wrote a message of 18 lines which said: Yes, I saw that, but I believe whether it's the main concern or not is irrelevant -- the question to ask should be, is this variation of attack relevant to the scope of the

Re: Rathole exit? Was: [dnsop] Doug's attack scenarios without SPF

2006-11-14 Thread Andrew Sullivan
On Mon, Nov 13, 2006 at 10:15:07PM -0800, Douglas Otis wrote: domain. His issue only distracts from the SPF concern. Any remedy to resolve an NS chaining exploit raised by William, if there is an exploit, is completely orthogonal to the problem raised by the SPF script. Well, maybe. I'm

Re: Rathole exit? Was: [dnsop] Doug's attack scenarios without SPF

2006-11-14 Thread Andras Salamon
On Mon, Nov 13, 2006 at 10:15:07PM -0800, Douglas Otis wrote: There is a general threat to DNS created by an experimental email script contained within DNS records. As far as I understand, the attack vector relies on some process outside the DNS retrieving, interpreting and acting on records

[dnsop] what scares me about doug...

2006-11-14 Thread Edward Lewis
...'s presentation last week... (I'm being sarcastic about being scared of Doug, btw. But it gives a good title.) The issues of SPF, DKIM, other SPAM prevention technics and in general slapped-on security approaches is not a topic for this list. If and when I refer to a case, it's for

[dnsop] Re: Rathole exit? Was: Doug's attack scenarios without SPF

2006-11-14 Thread wayne
In [EMAIL PROTECTED] Douglas Otis [EMAIL PROTECTED] writes: The SPF script language does not improve data compression. APL RR (RFC3123) provides 10 times the informational density and existed prior to SPF development. *sigh* Where do you get this 10 times claim from? To represent an IPv4

Re: Rathole exit? Was: [dnsop] Doug's attack scenarios without SPF

2006-11-14 Thread william(at)elan.net
[I'll not be answering Doug directly. Mainly because if I start doing it, we'll continue forever as Doug would never stop (his arguments would still be same and not clear) and result is likely that most folks would locally blacklist both of us...] On Tue, 14 Nov 2006, Andrew Sullivan wrote:

Re: [dnsop] what scares me about doug...

2006-11-14 Thread Paul Wouters
On Tue, 14 Nov 2006, Edward Lewis wrote: What I find potentially troubling is that an application might choose to refer to the DNS in an unwise way to find ancillary data to verify that a received message unit is genuine and is authorized to be processed. (Un)fortunately, the DNS is the best

Re: [dnsop] what scares me about doug...

2006-11-14 Thread Edward Lewis
At 20:27 +0100 11/14/06, Paul Wouters wrote: On Tue, 14 Nov 2006, Edward Lewis wrote: The third ingredient is the amplification factor that is a result of robustness of the security. When slapping security onto any existing system, some level of robustness is lost. and gained? No,