Re: DNS hardening, was Re: Dan Kaminsky

2009-08-10 Thread Douglas Otis
This was responded to on the DNSEXT mailing list. Sorry, but your question was accidentally attributed to Paul who forwarded the message. DNSEXT Archive: http://ops.ietf.org/lists/namedroppers/ -Doug

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-07 Thread Ben Scott
On Thu, Aug 6, 2009 at 6:06 AM, Alexander Harrowell a.harrow...@gmail.com wrote: 1) Authenticate the nameserver to the client (and so on up the chain to the root) in order to defeat the Kaminsky attack, man in the middle, IP-layer interference. (Are you who you say you are?) DNSSEC fans will

Re: Dan Kaminsky

2009-08-07 Thread Randy Bush
Have you seen the iphone decoding bar code into urls ? doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan. http://en.wikipedia.org/wiki/QR_Code randy

RE: Dan Kaminsky

2009-08-07 Thread Buhrmaster, Gary
doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan. http://en.wikipedia.org/wiki/QR_Code Yep. Called iMatrix. (There are probably others too)

QR-Codes... was: Re: Dan Kaminsky

2009-08-07 Thread Dragos Ruiu
On 7-Aug-09, at 8:01 PM, Randy Bush wrote: Have you seen the iphone decoding bar code into urls ? doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan. http://en.wikipedia.org/wiki/QR_Code There are multiple (5+ at last count)

Re: Dan Kaminsky

2009-08-07 Thread Jorge Amodio
Have you seen the iphone decoding bar code into urls ? doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan. Yes, is not really new but it can decode QR, DataMatrix (same as used for postage), ShotCode and bar code. With the new camera

Re: Dan Kaminsky

2009-08-07 Thread Jorge Amodio
doesn't the iphone has an app to decode qr-codes similar to the one built into almost all keitai here in japan.     http://en.wikipedia.org/wiki/QR_Code Yep.  Called iMatrix.  (There are probably others too) Yes, that's one of the apps. Anyway, as you can see this is just one example that

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-07 Thread Steven M. Bellovin
On Thu, 06 Aug 2009 06:51:24 + Paul Vixie vi...@isc.org wrote: Christopher Morrow morrowc.li...@gmail.com writes: how does SCTP ensure against spoofed or reflected attacks? there is no server side protocol control block required in SCTP. someone sends you a create association

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Paul Vixie
Christopher Morrow morrowc.li...@gmail.com writes: how does SCTP ensure against spoofed or reflected attacks? there is no server side protocol control block required in SCTP. someone sends you a create association request, you send back a ok, here's your cookie and you're done until/unless

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Douglas Otis: Establishing SCTP as a preferred DNS transport offers a safe harbor for major ISPs. SCTP is not a suitable transport for DNS, for several reasons: Existing SCTP stacks are not particularly robust (far less than TCP). The number of bugs still found in them is rather large.

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Paul Vixie: there is no server side protocol control block required in SCTP. SCTP needs per-peer state for congestion control and retransmission. someone sends you a create association request, you send back a ok, here's your cookie and you're done until/unless they come back and say ok,

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* John Levine: 3) Random case in queries, e.g. GooGLe.CoM This does not work well without additional changes because google.com can be spoofed with responses to 123352123.com (or even 123352123.). Unbound strives to implement the necessary changes, some of which are also required if you want

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Florian Weimer
* Naveen Nathan: I'll assume the cipher used for the lasting secret keys is interchangeable. Last time I checked, even the current cryptographic algorithms weren't specified. It's unlikely that there is an upgrade path (other than stuffing yet another magic label into your name server names).

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Paul Jakma
On Thu, 6 Aug 2009, Florian Weimer wrote: This doesn't seem possible with current SCTP because the heartbeat rate quickly adds up and overloads servers further upstream. It also does not work on UNIX-like system where processes are short-lived and get a fresh stub resolver each time they are

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Alexander Harrowell
There are really two security problems here, which implies that two different methods might be necessary: 1) Authenticate the nameserver to the client (and so on up the chain to the root) in order to defeat the Kaminsky attack, man in the middle, IP-layer interference. (Are you who you say you

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Tony Finch
On Wed, 5 Aug 2009, Naveen Nathan wrote: I might misunderstand how dnscurve works, but it appears that dnscurve is far easier to deploy and get running. Not really. There are multiple competing mature implementations of DNSSEC and you won't be in a network of 1 if you deploy it. Tony. --

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Christopher Morrow
On Thu, Aug 6, 2009 at 2:51 AM, Paul Vixievi...@isc.org wrote: Christopher Morrow morrowc.li...@gmail.com writes: how does SCTP ensure against spoofed or reflected attacks? there is no server side protocol control block required in SCTP.  someone sends you a create association request, you

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Douglas Otis
On 8/5/09 7:05 PM, Naveen Nathan wrote: On Wed, Aug 05, 2009 at 09:17:01PM -0400, John R. Levine wrote: ... It seems to me that the situation is no worse than DNSSEC, since in both cases the software at each hop needs to be aware of the security stuff, or you fall back to plain unsigned DNS.

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Paul Vixie
note, i went off-topic in my previous note, and i'll be answering florian on namedroppers@ since it's not operational. chris's note was operational: Date: Thu, 6 Aug 2009 10:18:11 -0400 From: Christopher Morrow morrowc.li...@gmail.com awesome, how does that work with devices in the

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Ross Vandegrift
On Thu, Aug 06, 2009 at 03:16:25PM +, Paul Vixie wrote: ...: Do loadbalancers, or loadbalanced deployments, deal with this properly? (loadbalancers like F5, citrix, radware, cisco, etc...) as far as i know, no loadbalancer understands SCTP today. if they can be made to pass SCTP

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-06 Thread Christopher Morrow
On Thu, Aug 6, 2009 at 11:16 AM, Paul Vixievi...@isc.org wrote: note, i went off-topic in my previous note, and i'll be answering florian on namedroppers@ since it's not operational.  chris's note was operational: Date: Thu, 6 Aug 2009 10:18:11 -0400 From: Christopher Morrow

Re: Dan Kaminsky

2009-08-05 Thread bert hubert
On Tue, Aug 4, 2009 at 9:25 PM, Paul Vixievi...@isc.org wrote: i didn't pay any special heed to it since there was no way to get enough bites at the apple due to negative caching. when i saw djb's announcement (i think in 1999 or 2000, so, seven years after schuba's paper came out) i said,

Re: Dan Kaminsky

2009-08-05 Thread Leo Bicknell
In a message written on Tue, Aug 04, 2009 at 11:32:46AM -0700, Kevin Oberman wrote: There is NO fix. There never will be as the problem is architectural to the most fundamental operation of DNS. Other than replacing DNS (not feasible), the only way to prevent this form of attack is DNSSEC. The

Re: Dan Kaminsky

2009-08-05 Thread Florian Weimer
* Leo Bicknell: In a message written on Tue, Aug 04, 2009 at 11:32:46AM -0700, Kevin Oberman wrote: There is NO fix. There never will be as the problem is architectural to the most fundamental operation of DNS. Other than replacing DNS (not feasible), the only way to prevent this form of

Re: Dan Kaminsky

2009-08-05 Thread Nick Hilliard
On 05/08/2009 15:18, Leo Bicknell wrote: I don't understand why replacing DNS is not feasible. I'd be happy to think about replacing the DNS as soon as we've finished off migrating to an ipv6-only internet in a year or two. Shall we set up a committee to try to make it happen faster? Nick

DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Roland Dobbins
On Aug 5, 2009, at 9:32 PM, Florian Weimer wrote: We might have an alternative one day, but it's going to happen by accident, through generalization of an internal naming service employed by a widely-used application. Or even more likely, IMHO, that more and more applications will have

Re: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Mark Andrews
In message 825c8ac7-c01e-4934-92fd-e7b9e8091...@arbor.net, Roland Dobbins wri tes: On Aug 5, 2009, at 9:32 PM, Florian Weimer wrote: We might have an alternative one day, but it's going to happen by accident, through generalization of an internal naming service employed by a

RE: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Erik Soosalu
[mailto:rdobb...@arbor.net] Sent: Wednesday, August 05, 2009 10:44 AM To: NANOG list Subject: DNS alternatives (was Re: Dan Kaminsky) On Aug 5, 2009, at 9:32 PM, Florian Weimer wrote: We might have an alternative one day, but it's going to happen by accident, through generalization

Re: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Roland Dobbins
On Aug 5, 2009, at 10:11 PM, Mark Andrews wrote: For all it's short comings the DNS and the single namespace it brings is much better than having a multitude of namespaces. I agree with you, but I don't think this approach is going to persist as the standard model. Increasingly,

Re: DNS alternatives (was Re: Dan Kaminsky)

2009-08-05 Thread Roland Dobbins
On Aug 5, 2009, at 10:20 PM, Erik Soosalu wrote: Multiple systems end up with problems. Yes, and again, I'm not advocating this approach. I just think it's most likely where we're going to end up, long-term. --- Roland

Re: Dan Kaminsky

2009-08-05 Thread Leo Bicknell
In a message written on Wed, Aug 05, 2009 at 02:32:27PM +, Florian Weimer wrote: The transport protocol is a separate issue. It is feasible to change it, but the IETF has a special working group which is currently tasked to prevent any such changes. My interest was in replacing the

DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John Levine
Other than DNSSEC, I'm aware of these relatively simple hacks to add entropy to DNS queries. 1) Random query ID 2) Random source port 3) Random case in queries, e.g. GooGLe.CoM 4) Ask twice (with different values for the first three hacks) and compare the answers I presume everyone is doing

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread bert hubert
On Wed, Aug 5, 2009 at 6:48 PM, John Levinejo...@iecc.com wrote: 3) Random case in queries, e.g. GooGLe.CoM 4) Ask twice (with different values for the first three hacks) and compare the answers I presume everyone is doing the first two.  Any experience with the other two to report? 3

Re: Dan Kaminsky

2009-08-05 Thread Phil Regnauld
Jorge Amodio (jmamodio) writes: It may sound too futuristic and inspired from science fiction, but I never saw Captain Piccard typing a URL on the Enterprise. That's ok, I've never seen the Enterprise at the airport. Sooner or later, we or the new generation of ietfers and nanogers,

Re: Dan Kaminsky

2009-08-05 Thread Chris Adams
Once upon a time, Phil Regnauld regna...@catpipe.net said: Jorge Amodio (jmamodio) writes: It may sound too futuristic and inspired from science fiction, but I never saw Captain Piccard typing a URL on the Enterprise. That's ok, I've never seen the Enterprise at the airport. I

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
It may sound too futuristic and inspired from science fiction, but I never saw Captain Piccard typing a URL on the Enterprise.        That's ok, I've never seen the Enterprise at the airport. Don't confuse sight with vision. Sooner or later, we or the new generation of ietfers and

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
      That's ok, I've never seen the Enterprise at the airport. I have, but not that Enterprise (I saw the space shuttle orbiter Enterprise on a 747 land here). There is one docked at Pier 26 in New York City :-)

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Phil Regnauld
bert hubert (bert.hubert) writes: 5 is 'edns ping', but it was effectively blocked because people thought DNSSEC would be easier to do, or demanded that EDNS PING (http://edns-ping.org) would offer everything that DNSSEC offered. I'm surprised you failed to mention

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 9:48 AM, John Levine wrote: Other than DNSSEC, I'm aware of these relatively simple hacks to add entropy to DNS queries. 1) Random query ID 2) Random source port 3) Random case in queries, e.g. GooGLe.CoM 4) Ask twice (with different values for the first three hacks) and compare

Re: Dan Kaminsky

2009-08-05 Thread Marshall Eubanks
On Aug 5, 2009, at 1:30 PM, Jorge Amodio wrote: It may sound too futuristic and inspired from science fiction, but I never saw Captain Piccard typing a URL on the Enterprise. That's ok, I've never seen the Enterprise at the airport. Go to Dulles Airport. She used to be on the

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Roland Dobbins
On Aug 6, 2009, at 1:12 AM, Douglas Otis wrote: Having major providers support the SCTP option will mitigate disruptions caused by DNS DDoS attacks using less resources. Can you elaborate on this (or are you referring to removing the spoofing vector?)?

RE: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Skywing
Levine jo...@iecc.com Cc: nanog@nanog.org nanog@nanog.org Subject: Re: DNS hardening, was Re: Dan Kaminsky On 8/5/09 9:48 AM, John Levine wrote: Other than DNSSEC, I'm aware of these relatively simple hacks to add entropy to DNS queries. 1) Random query ID 2) Random source port 3) Random

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John R. Levine
5 is 'edns ping', but it was effectively blocked because people thought DNSSEC would be easier to do, or demanded that EDNS PING (http://edns-ping.org) would offer everything that DNSSEC offered. I'm surprised you failed to mention http://dnscurve.org/crypto.html, which is

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John R. Levine
3 works, but offers zero protection against 'kaminsky spoofing the root' since you can't fold the case of 123456789.. And the root is the goal. Good point. 5) Download your own copy of the root zone every few days from http://www.internic.net/domain/, check the signature if you can find the

Re: Dan Kaminsky

2009-08-05 Thread Scott Weeks
--- jmamo...@gmail.com wrote: From: Jorge Amodio jmamo...@gmail.com Sooner or later, we or the new generation of ietfers and nanogers, will need to start thinking about a new naming paradigm and design the services and protocols associated with it. The key question is, when we start?

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 11:38 AM, Skywing wrote: That is, of course, assuming that SCTP implementations someday clean up their act a bit. I'm not so sure I'd suggest that they're really ready for prime time at this point. SCTP DNS would be intended for ISPs validating DNS where there would be fewer

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
Read Patterns in Network Architecture by John Day. A Return to Fundamentals, great book. the Internet today is more like DOS, but what we need should be more like Unix Great thing he didn't say Windows :-) Cheers

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 11:31 AM, Roland Dobbins wrote: On Aug 6, 2009, at 1:12 AM, Douglas Otis wrote: Having major providers support the SCTP option will mitigate disruptions caused by DNS DDoS attacks using less resources. Can you elaborate on this (or are you referring to removing the spoofing

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Christopher Morrow
On Wed, Aug 5, 2009 at 5:24 PM, Douglas Otisdo...@mail-abuse.org wrote: On 8/5/09 11:31 AM, Roland Dobbins wrote: On Aug 6, 2009, at 1:12 AM, Douglas Otis wrote: Having major providers support the SCTP option will mitigate disruptions caused by DNS DDoS attacks using less resources. Can

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Steven M. Bellovin
On Wed, 5 Aug 2009 15:07:30 -0400 (EDT) John R. Levine jo...@iecc.com wrote: 5 is 'edns ping', but it was effectively blocked because people thought DNSSEC would be easier to do, or demanded that EDNS PING (http://edns-ping.org) would offer everything that DNSSEC offered. I'm

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 12:49 PM, Jorge Amodio jmamo...@gmail.com wrote: At some time in the future and when a new paradigm for the user interface is conceived, we may not longer have the end user “typing” a URL, the DNS or something similar will still be in the background providing name to

Re: Dan Kaminsky

2009-08-05 Thread Marshall Eubanks
On Aug 5, 2009, at 6:26 PM, Ben Scott wrote: On Wed, Aug 5, 2009 at 12:49 PM, Jorge Amodio jmamo...@gmail.com wrote: At some time in the future and when a new paradigm for the user interface is conceived, we may not longer have the end user “typing” a URL, the DNS or something similar

Re: Dan Kaminsky

2009-08-05 Thread Chris Adams
Once upon a time, Ben Scott mailvor...@gmail.com said: In the the vast majority of cases I have seen, people don't type domain names, they search the web. When they do type a domain name, they usually type it into the Google search box. Web != Internet. DNS is used for much more than web

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Douglas Otis
On 8/5/09 2:49 PM, Christopher Morrow wrote: and state-management seems like it won't be too much of a problem on that dns server... wait, yes it will. DNSSEC UDP will likely become problematic. This might be due to reflected attacks, fragmentation related congestion, or packet loss. When

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 6:37 PM, Chris Adamscmad...@hiwaay.net wrote: ... we may not longer have the end user “typing” a URL, the DNS or something similar will still be in the background providing name to address mapping ...   In the the vast majority of cases I have seen, people don't type

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
At some time in the future and when a new paradigm for the user interface is conceived, we may not longer have the end user “typing” a URL, the DNS or something similar will still be in the background providing name to address mapping but there will be no more monetary value associated with it

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 7:06 PM, Jorge Amodiojmamo...@gmail.com wrote: Talking about the subject with a friend during the past few days, most of the conversation ended being around the User Interface. A popular idiom is where the rubber meets the road. It comes from cars, of course. The

Re: Dan Kaminsky

2009-08-05 Thread Jorge Amodio
 I think it would be nice if we had some nicely designed, elegant, centralized protocol to do all this, but I suspect that won't happen. s/centralized/distributed/ them on their iPhone via some other damn thing.  Yes, it'll be a mess. Have you seen the iphone decoding bar code into urls ?  

Re: Dan Kaminsky

2009-08-05 Thread Joe Greco
(2) Saying type our name into $SERVICE, where $SERVICE is some popular website that most people trust (like Facebook or whatever), and has come up with a workable system for disambiguation. You might want to talk to AOL about that. ... JG -- Joe Greco - sol.net Network Services - Milwaukee,

Re: Dan Kaminsky

2009-08-05 Thread Mark Andrews
In message 59f980d60908051602y1fe364devfb5f590a8c795...@mail.gmail.com, Ben S cott writes: On Wed, Aug 5, 2009 at 6:37 PM, Chris Adamscmad...@hiwaay.net wrote: ... we may not longer have the end user =93typing=94 a URL, the DNS or something similar will still be in the background providing

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 7:30 PM, Mark Andrews ma...@isc.org wrote:        Which requires that people type addresses in in the first        place. As I wrote, we're already part of the way towards people not having to do even that.        No they make finding a unique id easy by leveraging a

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread John R. Levine
http://dnscurve.org/crypto.html, which is always brought up, but never seems to solve the problems mentioned. As I understand it, dnscurve protects transmissions, not objects. That's not the way DNS operates today, what with N levels of cache. It may or may not be better, but it's a much

Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 8:40 PM, James R. Cutlerjames.cut...@consultant.com wrote: (2) Saying type our name into $SERVICE, where $SERVICE is some popular website that most people trust (like Facebook or whatever), and has come up with a workable system for disambiguation. I can only hope that

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Mark Andrews
In message alpine.bsf.2.00.0908051952480.3...@simone.lan, John R. Levine writes: http://dnscurve.org/crypto.html, which is always brought up, but never seems to solve the problems mentioned. As I understand it, dnscurve protects transmissions, not objects. That's not the way DNS

Re: DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Christopher Morrow
On Wed, Aug 5, 2009 at 6:53 PM, Douglas Otisdo...@mail-abuse.org wrote: On 8/5/09 2:49 PM, Christopher Morrow wrote: and state-management seems like it won't be too much of a problem on that dns server... wait, yes it will. DNSSEC UDP will likely become problematic.  This might be due to

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Naveen Nathan
On Wed, Aug 05, 2009 at 09:17:01PM -0400, John R. Levine wrote: ... It seems to me that the situation is no worse than DNSSEC, since in both cases the software at each hop needs to be aware of the security stuff, or you fall back to plain unsigned DNS. I might misunderstand how dnscurve

Re: Dan Kaminsky

2009-08-05 Thread Mark Andrews
-- Ben @ 209.85.221.52 Really? farside.isc.org:marka {2} % telnet 209.85.221.52 25 Trying 209.85.221.52... Connected to mail-qy0-f52.google.com. Escape character is '^]'. 220 mx.google.com ESMTP 26si8920387qyk.119 helo farside.isc.org 250 mx.google.com at your service mail from: ma...@isc.org

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Ben Scott
On Wed, Aug 5, 2009 at 10:05 PM, Naveen Nathannav...@calpop.com wrote: I might misunderstand how dnscurve works, but it appears that dnscurve is far easier to deploy and get running. My understanding: They really do different things. They also have different behaviors. DNSCurve aims to

Re: dnscurve and DNS hardening, was Re: Dan Kaminsky

2009-08-05 Thread Naveen Nathan
Ben, Thanks for the cogent comparison between the two security systems for DNS. DNSCurve requires more CPU power on nameservers (for the more extensive crypto); DNSSEC requires more memory (for the additional DNSSEC payload). This is only true for the initial (Elliptic Curve)

Re: Dan Kaminsky

2009-08-04 Thread Curtis Maurand
andrew.wallace wrote: On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiud...@kyx.net wrote: at the risk of adding to the metadiscussion. what does any of this have to do with nanog? (sorry I'm kinda irritable about character slander being spammed out unnecessarily to unrelated public lists lately

Re: Dan Kaminsky

2009-08-04 Thread Valdis . Kletnieks
On Tue, 04 Aug 2009 13:32:42 EDT, Curtis Maurand said: What does this have to do with Nanog, the guy found a critical security bug on DNS last year. He didn't find it. He only publicized it. the guy who wrote djbdns fount it years ago. Powerdns was patched for the flaw a year and a

Re: Dan Kaminsky

2009-08-04 Thread Mikael Abrahamsson
On Tue, 4 Aug 2009, valdis.kletni...@vt.edu wrote: Yes, but a wise man without a PR agent doesn't do the *rest* of the community much good. A Morris or Bernstein may *see* the problem a decade before, but it may take a Mitnick or Kaminsky to make the *rest* of us able to see it... Same

Re: Dan Kaminsky

2009-08-04 Thread Kevin Oberman
Date: Tue, 04 Aug 2009 13:32:42 -0400 From: Curtis Maurand cmaur...@xyonet.com andrew.wallace wrote: On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiud...@kyx.net wrote: at the risk of adding to the metadiscussion. what does any of this have to do with nanog? (sorry I'm kinda

Re: Dan Kaminsky

2009-08-04 Thread Patrick W. Gilmore
There is NO fix. There never will be as the problem is architectural to the most fundamental operation of DNS. Other than replacing DNS (not feasible), the only way to prevent this form of attack is DNSSEC. The fix only makes it much harder to exploit. Randomizing source ports and QIDs

Re: Dan Kaminsky

2009-08-04 Thread Paul Vixie
Curtis Maurand cmaur...@xyonet.com writes: What does this have to do with Nanog, the guy found a critical security bug on DNS last year. He didn't find it. He only publicized it. the guy who wrote djbdns fount it years ago. first blood on both the DNS TXID attack, and on what we now call

Re: Dan Kaminsky

2009-08-04 Thread Dragos Ruiu
On 3-Aug-09, at 9:43 PM, andrew.wallace wrote: Hi, Read my post one more time and think though: Only zf0 are legally in the shit. The guy Dragos Ruiu has absolutely no case against me. Copy paste doesn't count as defamation, speak to Wired's legal team if you have an issue. Cheers,

Re: Dan Kaminsky

2009-08-03 Thread Richard A Steenbergen
On Sat, Aug 01, 2009 at 01:11:17PM -0700, Cord MacLeod wrote: I don't see a video attached or an audio recording. Thus no slander. Libel on the other hand is a different matter. You have those backwards. Slander is transitory (i.e. spoken) defamation, libel is written/recorded/etc

Re: Dan Kaminsky

2009-08-03 Thread Cord MacLeod
Read my post one more time... The standards you described are what I described. No video, no audio = no speech = no slander. The article was written, hence libel. On Aug 3, 2009, at 6:02 PM, Richard A Steenbergen wrote: On Sat, Aug 01, 2009 at 01:11:17PM -0700, Cord MacLeod wrote: I

Re: Dan Kaminsky

2009-08-03 Thread andrew.wallace
Hi, Read my post one more time and think though: Only zf0 are legally in the shit. The guy Dragos Ruiu has absolutely no case against me. Copy paste doesn't count as defamation, speak to Wired's legal team if you have an issue. Cheers, Andrew On Tue, Aug 4, 2009 at 2:02 AM, Richard A

Re: Dan Kaminsky

2009-08-01 Thread andrew.wallace
On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiud...@kyx.net wrote: at the risk of adding to the metadiscussion. what does any of this have to do with nanog? (sorry I'm kinda irritable about character slander being spammed out unnecessarily to unrelated public lists lately ;-P ) What does this

Re: Dan Kaminsky

2009-08-01 Thread Cord MacLeod
I don't see a video attached or an audio recording. Thus no slander. Libel on the other hand is a different matter. On Aug 1, 2009, at 8:10 AM, andrew.wallace wrote: On Thu, Jul 30, 2009 at 11:48 PM, Dragos Ruiud...@kyx.net wrote: at the risk of adding to the metadiscussion. what does any

Re: Dan Kaminsky

2009-07-30 Thread Dragos Ruiu
On 29-Jul-09, at 9:23 PM, Randy Bush wrote: LAS VEGAS — Two noted security professionals were targeted this week by hackers who broke into their web pages, stole personal data and posted it online on the eve of the Black Hat security conference. boring. Two noted security professionals,

Re: Dan Kaminsky

2009-07-30 Thread Richard A Steenbergen
On Thu, Jul 30, 2009 at 03:48:18PM -0700, Dragos Ruiu wrote: On 29-Jul-09, at 9:23 PM, Randy Bush wrote: Ettore Bugatti, maker of the finest cars of his day, was once asked why his cars had less than perfect brakes. He replied something like, Any fool can make a car stop. It takes

Re: Dan Kaminsky

2009-07-29 Thread andrew.wallace
--- On Wed, 7/29/09, Scott Weeks sur...@mauigateway.com wrote: From: Scott Weeks sur...@mauigateway.com Subject: Re: Fwd: Dan Kaminsky To: andrew.wallace andrew.wall...@rocketmail.com Date: Wednesday, July 29, 2009, 10:10 PM --- andrew.wall...@rocketmail.com wrote: