[dns-operations] Where to find "DNS resolution path corruption"?

Mark Andrews Mark_Andrews at isc.org
Tue Feb 19 23:36:44 UTC 2008


> On Tue, Feb 19, 2008 at 09:16:15AM +0100, Stephane Bortzmeyer wrote:
> 
> > To summary: not a DNS problem at all. Purely a Windows security issue.
> 
> The stub-to-recursive path touches both communities: windows and
> network operators; and even more if there is application caching.
> 
> Traditional poisoning attacks of course usually have only DNS or
> network operators on either end.  (We'll ignore the trivial DNS
> poisoning attacks against old windows resolvers, which are entirely a
> Windows problem.)
> 
> The paper did not intentionally characterize blame (well, the
> 'suggestions' section was admittedly DNS-centric, and looked mostly to
> the network operators).  Nonetheless, I'm quite happy to characterize
> this anyway that results in either community taking responsibility and
> offering solutions.  When I talk to network operators, I say this is a
> DNS problem, since they're more likely to take action.  When I talk to
> software developers, I say this is a Windows problem, since they're
> then more likely to take action.
> 
> Having hinted at blame this way, I've found some ISPs are considering
> 'locking in' their users who resolve using the ISPs recursive servers;
> an opt-out might preserve e2e for customers who want to use other DNS
> services (e.g., the opt-in OpenDNS).  Or at least these are the ideas
> being considered by those who believe this is not just a Windows
> problem, but their network problem.

	And ISP's will do this in a dumb manner the same way as
	hotels do this in a dumb manner.  They will add a
	"transparent" DNS proxy/intercept box.

	They won't look at "rd", thereby breaking every interative
	resolver.

	They won't pass through queries that have a TSIG breaking
	support for those using a tamper resistant channel.

	They may not have a DNSSEC aware box breaking the ability
	to use DNSSEC.

	They won't advertise this in advance.

	They won't have a opt in/out mechanism.

> Your larger point is that the paper suggestions were very
> network-centric.  True enough.  In candor, this reflects the limited
> time I had to write the paper, and the limited space.  (We wanted more
> tables in the paper.)  A compromised host can have any service
> disabled, including DNSSEC.
> 
> -- 
> David Dagon              /"\                          "When cryptography
> dagon at cc.gatech.edu      \ /  ASCII RIBBON CAMPAIGN    is outlawed, bayl
> Ph.D. Student             X     AGAINST HTML MAIL      bhgynjf jvyy unir
> Georgia Inst. of Tech.   / \                           cevinpl."
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.oarci.net
> http://lists.oarci.net/mailman/listinfo/dns-operations
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: Mark_Andrews at isc.org



More information about the dns-operations mailing list