Re: large organization nameservers sending icmp packets to dns servers.

2007-08-09 Thread Stephane Bortzmeyer
On Wed, Aug 08, 2007 at 03:20:56PM -0700, william(at)elan.net [EMAIL PROTECTED] wrote a message of 23 lines which said: How is that an anti DoS technique when you actually need to return an answer via UDP in order to force next request via TCP? Because there is no amplification: the UDP

Re: Industry best practices (was Re: large organization nameservers sending icmp packets to dns servers)

2007-08-09 Thread Doug Barton
I can add one more voice to the chorus, not that it will necessarily change anyone's mind. :) When I was at Yahoo! the question of whether to keep TCP open or not had already been settled, since they had found that if they didn't have it open there was some small percentage of users who

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread Patrick W. Gilmore
On Aug 8, 2007, at 2:11 AM, David Schwartz wrote: On Aug 7, 2007, at 4:33 PM, Donald Stahl wrote: If you don't like the rules- then change the damned protocol. Stop just doing whatever you want and then complaining when other people disagree with you. I think this last part is the key.

RE: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread Jamie Bowden
] [mailto:[EMAIL PROTECTED] On Behalf Of Steve Gibbard Sent: Tuesday, August 07, 2007 6:10 PM To: Nanog Subject: Re: large organization nameservers sending icmp packets to dns servers. On Tue, 7 Aug 2007, Donald Stahl wrote: It has nothing to do with judging how one runs their network or any

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread Valdis . Kletnieks
On Wed, 08 Aug 2007 10:33:56 EDT, Patrick W. Gilmore said: Paying $10 and registering a domain IN NOW WAY means I promised a bazillion people anything. What happened to: You can run your network however you want? You're totally welcome to run your own network backbone as IPv6-only or

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread Adrian Chadd
On Wed, Aug 08, 2007, Jamie Bowden wrote: Forgive my broken formatting, but LookOut, it's Microsoft! Is what we use, period. I have a question related to what you posted below, and it's a pretty simple one: How is answering a query on TCP/53 any MORE dangerous than answering it on

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread Tony Finch
On Tue, 7 Aug 2007, [EMAIL PROTECTED] wrote: they *already* don't answer with the txt records if you try to do a 'dig aol.com any' because that 512 and the 497 returned on a 'dig aol.com mx' won't fit in one 512-byte packet. Wrong! You're probably not getting the txt records because you

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread David Conrad
On Aug 8, 2007, at 8:59 AM, Jamie Bowden wrote: How is answering a query on TCP/53 any MORE dangerous than answering it on UDP/53? Really. I'd like to know how one of these security nitwits justifies it. It's the SAME piece of software answering the query either way. How many bytes of

RE: large organization nameservers sending icmp packets to dns servers.

2007-08-08 Thread william(at)elan.net
On Tue, 7 Aug 2007, Donald Stahl wrote: All things being equal (which they're usually not) you could use the ACK response time of the TCP handshake if they've got TCP DNS resolution available. Though again most don't for security reasons... Then most are incredibly stupid. Several anti DoS

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Patrick W. Gilmore
On Aug 7, 2007, at 2:14 PM, Donald Stahl wrote: All things being equal (which they're usually not) you could use the ACK response time of the TCP handshake if they've got TCP DNS resolution available. Though again most don't for security reasons... Then most are incredibly stupid. Those

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Valdis . Kletnieks
On Tue, 07 Aug 2007 14:38:06 EDT, Patrick W. Gilmore said: In addition, any UDP truncated response needs to be retried via TCP- blocking it would cause a variety of problems. Since we are talking about authorities here, one can control the size of ones responses. Barely. % dig aol.com

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Kevin Oberman
Date: Tue, 7 Aug 2007 16:33:22 -0400 (EDT) From: Donald Stahl [EMAIL PROTECTED] This has been a pain for me for years. I have tried to reason with security people about this and, while they don't dispute my reasoning, they always end up saying that it is the standard practice and that,

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Valdis . Kletnieks
On Tue, 07 Aug 2007 16:10:17 EDT, Patrick W. Gilmore said: The point is, if you are the authority, you know how big the packet is. If you know it ain't over 512, then you don't need TCP. Right. But remember the discussion is that *we* (for some value of we) are querying some *other*

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Steve Gibbard
On Tue, 7 Aug 2007, Donald Stahl wrote: It has nothing to do with judging how one runs their network or any other such nonsense. The RFC's say TCP 53 is fine. If you don't want to follow the rules, fine, but have the temerity to admit that it is stupid. I don't want to wade into this

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread David Conrad
Hi, On Aug 7, 2007, at 1:33 PM, Donald Stahl wrote: Can someone, anyone, please explain to me why blocking TCP 53 is considered such a security enhancement? It's a token gesture and does nothing to really help improve security. It does, however, cause problems. It has been argued that

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Andrew Sullivan
Dear colleagues, I apologise for replying twice in the same thread (especially as I tend not to post here very much, on the grounds that I usually don't know what I'm talking about). I feel compelled to object to the below remark, however, because I think it gets at the heart of the problem.

RE: large organization nameservers sending icmp packets to dns servers.

2007-08-07 Thread Jason J. W. Williams
The answer is simple- because they are supposed to be allowed. By disallowing them you are breaking the agreed upon rules for the protocol. Before long it becomes impossible to implement new features because you can't be sure if someone else hasn't broken something intentionally. I don't

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-06 Thread Valdis . Kletnieks
On Mon, 06 Aug 2007 17:21:49 -, John Levine said: Sounds like one of the global-scale load balancers - when you do a (presumably) recursive DNS lookup of one of their hosts, they'll ping the nameserver from several locations and see which one gets an answer the fastest. Why would

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-06 Thread Steve Atkins
On Aug 6, 2007, at 10:21 AM, John Levine wrote: Sounds like one of the global-scale load balancers - when you do a (presumably) recursive DNS lookup of one of their hosts, they'll ping the nameserver from several locations and see which one gets an answer the fastest. Why would they

Re: large organization nameservers sending icmp packets to dns servers.

2007-08-06 Thread Chris L. Morrow
On Mon, 6 Aug 2007, Patrick W. Gilmore wrote: first I agree that in most cases the 'RTT to client cacheresolver' probably works well enough. That said though... Owen said it worked well for his customers (in a past life), and he has operational experience with this. Can anyone give a