Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-26 Thread Paul Vixie
[EMAIL PROTECTED] (Randy Bush) writes: i hope all my competitors don't patch. i think that that statement is false. the resulting insecurity of that endpoint population will be a tsunami that will swamp people far away, it'll just be worse for those at the epicenter (meaning: who don't patch.)

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-26 Thread Joe Greco
what i do not understand is why people think screaming to the choir will make any significant difference? Think about it. Would you rather nobody make a big deal about it and have it go unpatched lots of places, and have nobody understand what a monumental train wreck this all is, or would it

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-26 Thread bmanning
On Sat, Jul 26, 2008 at 03:05:18PM -0500, Joe Greco wrote: what i do not understand is why people think screaming to the choir will make any significant difference? And Paul's absolutely correct, this is not something where we can afford to let that happen. Paul is correct if

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-26 Thread bmanning
On Sat, Jul 26, 2008 at 05:47:54PM -0400, Sean Donelan wrote: On Sat, 26 Jul 2008, [EMAIL PROTECTED] wrote: there you go. the massive effort to patch would likley have better been spent to actually -sign- the stupid zones and work out key distribution. but no... running around

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-25 Thread Nathan Ward
On 25/07/2008, at 6:45 AM, Scott Berkman wrote: Is it just me or is the test page below down now? Or maybe some poisoned the NS record for dns-oarc.net and sent it to nowhere to stop testing! (J/K since I can get to the rest of the page fine). Hmm, cute. So uh, is this patch available for

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-25 Thread Jorge Amodio
So is this patch a true fix or just a temporary fix until further work can be done on the problem? I guess you need to read some of the related papers/presentations/advisories/etc related to a subject that has been under discussion for more 20+ years. Answering your questions, as said

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-25 Thread Jared Mauch
On Thu, Jul 24, 2008 at 08:37:55PM -0400, [EMAIL PROTECTED] wrote: On Thu, 24 Jul 2008 17:31:01 EDT, Jay R. Ashworth said: But it seems to me that Paul, you are here espousing the opinion that there's no business value in people being able to trust that the domain name they heard on a TV ad

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-25 Thread Jay R. Ashworth
On Fri, Jul 25, 2008 at 07:31:30PM +1200, Nathan Ward wrote: So uh, is this patch available for download over HTTPS with a key that was generated by the vendor and signed by well trusted root CAs on a boxes with OpenSSL versions not released by Debian? PATCH NOW PATCH NOW seems like a

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-25 Thread Jorge Amodio
Regarding Bubba, he won't likely move until there is a real problem, this makes it on CNN, and even then, he may not understand what is going on. That win2k server in the corner never got updated. But when he realizes his business is at risk due to the buggy software, our pal Bubba

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Joe Greco
downplay this all you want, we can infect a name server in 11 seconds now, which was never true before. i've been tracking this area since 1995. don't try to tell me, or anybody, that dan's work isn't absolutely groundbreaking. i am sick and bloody tired of hearing from the people who

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Paul Vixie
i am sick and bloody tired of hearing from the people who aren't impressed. Well, Paul, I'm not *too* impressed, and so far, I'm not seeing what is groundbreaking, except that threats discussed long ago have become more practical due to the growth of network and processing speeds, which was

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Joe Greco
So, look at other options: * Widen the query space by using multiple IP addresses as source. This, of course, has all the problems with NAT gw's that the port solution did, except worse. This makes using your ISP's properly designed resolver even more attractive,

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Joe Greco
i am sick and bloody tired of hearing from the people who aren't impressed. Well, Paul, I'm not *too* impressed, and so far, I'm not seeing what is groundbreaking, except that threats discussed long ago have become more practical due to the growth of network and processing speeds,

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Steve Tornio
On Jul 24, 2008, at 9:22 AM, Paul Vixie wrote: 11 seconds. and att refuses to patch. and all iphones use those name servers. This caught my attention, and so I tossed the ATT wireless card in my laptop and ran the test: [rogue:~] steve% dig +short porttest.dns-oarc.net TXT

RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread michael.dillon
So, look at other options: * Widen the query space by using multiple IP addresses as source. This, of course, has all the problems with NAT gw's that the port solution did, except worse. This makes using your ISP's properly designed resolver even more attractive, rather than

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Joe Abley
On 24 Jul 2008, at 10:56, Joe Greco wrote: MY move? Fine. You asked for it. Had I your clout, I would have used this opportunity to convince all these new agencies that the security of the Internet was at risk, and that getting past the who holds the keys for the root zone should be

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Gadi Evron
On Thu, 24 Jul 2008, Joe Greco wrote: downplay this all you want, we can infect a name server in 11 seconds now, which was never true before. i've been tracking this area since 1995. don't try to tell me, or anybody, that dan's work isn't absolutely groundbreaking. i am sick and bloody tired

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Sean Donelan
On Thu, 24 Jul 2008, Paul Vixie wrote: 11 seconds. and att refuses to patch. and all iphones use those name servers. Has att told you they are refusing to patch? Or are you just spreading FUD about att and don't actually have any information about their plans?

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread William Pitcock
On Thu, 2008-07-24 at 11:21 -0400, Sean Donelan wrote: On Thu, 24 Jul 2008, Paul Vixie wrote: 11 seconds. and att refuses to patch. and all iphones use those name servers. Has att told you they are refusing to patch? Or are you just spreading FUD about att and don't actually have

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Joe Greco
On 24 Jul 2008, at 10:56, Joe Greco wrote: MY move? Fine. You asked for it. Had I your clout, I would have used this opportunity to convince all these new agencies that the security of the Internet was at risk, and that getting past the who holds the keys for the root

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread William Herrin
On Thu, Jul 24, 2008 at 9:35 AM, Joe Greco [EMAIL PROTECTED] wrote: Well, Paul, I'm not *too* impressed, and so far, I'm not seeing what is groundbreaking, except that threats discussed long ago have become more practical due to the growth of network and processing speeds, which was a hazard

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Paul Vixie
11 seconds. and att refuses to patch. and all iphones use those name servers. Has att told you they are refusing to patch? Or are you just spreading FUD about att and don't actually have any information about their plans? I believe it is a hypothetical situation being

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Joe Abley
On 24 Jul 2008, at 11:40, Joe Greco wrote: Compared with the problem of global DNSSEC deployment, getting everybody in the world to patch their resolvers looks easy. Of course. That's why I said that deploying this patch was something that could be done *too*. OK, good. Sorry if I

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Laurence F. Sheldon, Jr.
Jorge Amodio wrote: /etc/hosts rulez !!! :-) Wonder if SRI wstill has the files. -- Requiescas in pace o email Two identifying characteristics of System Administrators: Ex turpi causa non oritur actioInfallibility, and the

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Jorge Amodio
/etc/hosts rulez !!! :-) Wonder if SRI wstill has the files. The SRI-NIC is long gone, I still remember the IP address of the ftp server 10.0.0.51 :-) There are several historic copies all over the net. Jorge

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Sean Donelan
On Thu, 24 Jul 2008, Paul Vixie wrote: ATT Response: US-CERT DNS Security Alert- announced July 8, 2008 2008. The latest patch for alert TA08-190B is currently being tested and will be deployed in the network as soon as its quality has been assured. That doesn't sound like refuses to patch.

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Tuc at T-B-O-H.NET
Jorge Amodio wrote: /etc/hosts rulez !!! :-) Wonder if SRI wstill has the files. Using the methods in RFC-952 and RFC-953 I wasn't able to get them. I can't find if there is an updated RFC/name to use. Tuc/TBOH ;)

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Paul Vixie
Refuses to patch sounds likes FUD. go ask 'em, and let us all know what they say. kaminsky tried to get everybody a month, but because of ptacek's sloppiness it ended up being 13 days. if any dns engineer at any internet carrier goes home to sleep or see their families before they patch, then

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread David W. Hankins
On Thu, Jul 24, 2008 at 09:56:32AM -0500, Joe Greco wrote: MY move? Fine. You asked for it. Had I your clout, I would have used this opportunity to convince all these new agencies that the security of the Internet was at risk, and that getting past the who holds the keys for the root zone

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Jorge Amodio
He,he,nice comment. The issue is that with todays html crap and embedded images on mails click is no longer required, just include a malicious tag forcing your resolver to go to bad boy's NS to resolve the URL and you are up in biz. Can't stop laughing ... its a rainy boring day in south

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Sean Donelan
On Thu, 24 Jul 2008, Paul Vixie wrote: Refuses to patch sounds likes FUD. go ask 'em, and let us all know what they say. I believe att has already said they are testing the patch and will deploy it as soon as their testing is completed. Other than you, I have not heard anyone in att say

RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Scott Berkman
, July 24, 2008 2:40 PM To: Steve Tornio Cc: [EMAIL PROTECTED] Subject: Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Steve Tornio wrote: On Jul 24, 2008, at 12:17 PM, Duane Wessels wrote: xpara.com tests to lock up my iPhone, or I would use that checker to verify

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Sean Donelan
On Thu, 24 Jul 2008, Paul Vixie wrote: I believe att has already said they are testing the patch and will deploy it as soon as their testing is completed. Other than you, I have not heard anyone in att say they are refusing to patch. i read att write that this was a rehash of a previously

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Rubens Kuhl Jr.
it to nowhere to stop testing! (J/K since I can get to the rest of the page fine). -Scott -Original Message- From: Ken A [mailto:[EMAIL PROTECTED] Sent: Thursday, July 24, 2008 2:40 PM To: Steve Tornio Cc: [EMAIL PROTECTED] Subject: Re: Paul Vixie: Re: [dns-operations] DNS

RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread marcus.sachs
Here's some older ones: http://pdp-10.trailing-edge.com/cgi-bin/searchbyname?name=hosts.txt Prior to departing SRI last year I spent a bunch of time trying to find some of the old SRI-NIC records. It appears that they were all cleaned out once the contract was closed and the Internet was

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Richard Parker
On Jul 24, 2008, at 10:17 AM, Duane Wessels wrote: Give this one a try: http://entropy.dns-oarc.net/test/ For one iPhone it reported 209.183.54.151 as having GREAT source port randomness and GREAT transaction ID randomness. However, despite the test reporting GREAT, the source ports

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Deepak Jain
For one iPhone it reported 209.183.54.151 as having GREAT source port randomness and GREAT transaction ID randomness. However, despite the test reporting GREAT, the source ports were _definitely_ non-random. http://5d93b9656563a44e4c900ff9.et.dns-oarc.net/ Proving random is not easy.

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Jason Frisvold
On Thu, Jul 24, 2008 at 1:14 PM, Paul Vixie [EMAIL PROTECTED] wrote: in spite of that caution i am telling you all, patch, and patch now. if you have firewall or NAT configs that prevent it, then redo your topology -- NOW. and make sure your NAT isn't derandomizing your port numbers on the way

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Jay R. Ashworth
On Thu, Jul 24, 2008 at 1:14 PM, Paul Vixie [EMAIL PROTECTED] wrote: and if you have time after that, write a letter to your congressman about the importance of DNSSEC, which sucks green weenies, and is a decade late, and which has no business model, but which the internet absolutely dearly

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-24 Thread Paul Vixie
So is this patch a true fix or just a temporary fix until further work can be done on the problem? the only true fix is DNSSEC. meanwhile we'll do UDP port randomization, plus we'll randomize the 0x20 bits in QNAMEs, plus we'll all do what nominum does and retry with TCP if there's a QID

re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

2008-07-23 Thread Paul Vixie
this is for whoever said it's just a brute force attack and/or it's the same attack that's been described before. maybe it goes double if that person is also the one who said my knowledge in this area is out of date. g. re: -- This message has been scanned for