[dns-operations] Having doubts about BCP38 solving the ORN problem
Fred Morris
m3047 at m3047.net
Sun Mar 31 19:33:29 UTC 2013
I'm sure this must have been discussed at some point, somewhere.
The premise with regard to BCP38 + open resolvers is that the spoofed
packets reside on different networks than the resolvers. If these
resolvers are primarily CPE and other unmaintained equipment, then it
stands to reason that they reside inside networks containing other
equipment; and this equipment could be the source of the source-spoofed
(DNS) packets.
Reflecting traffic off of an open resolver on one's own network would
serve to cloak the true identity of the originator.
BCP38 filtering on egress from the network is ineffective in such
scenarios because it is based on the assumption that the spoofed packets
are coming in from outside the network (and hence originated as egress
from someone else's network).
If the good guys can map open resolvers, so can the bad guys. (There are
no "black hat" data scientists?)
If we know that spoofed port queries are traversing peering points, then
we know the networks they're coming from. If we don't know that, then see
above; if we can't shame them, see "Maginot Line".
--
Fred Morris
More information about the dns-operations
mailing list