[166731] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Reverse DNS RFCs and Recommendations

daemon@ATHENA.MIT.EDU (Masataka Ohta)
Wed Nov 6 02:56:01 2013

Date: Wed, 06 Nov 2013 16:55:13 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
To: Mark Andrews <marka@isc.org>
In-Reply-To: <20131106013721.983D799806E@rock.dv.isc.org>
Cc: "nanog@nanog.org list" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Mark Andrews wrote:

>> You misunderstand very basic points on why forward and reverse
>> DNS checking is useful.
>>
>> If an attacker can snoop DHCP reply packet to a victim's CPE, the
>> attacker can snoop any packet to a victim's server, which is
>> already bad.
> 
> The DHCP reply packet is special as is is broadcasted.

What?

Rfc3315 is explicit on it:

   18.2.8. Transmission of Reply Messages

   The Reply message MUST be unicast
   through the interface on which the original message was received.

>> That is, Mark's security model is broken only to introduce
>> obscurity with worse security.
> 
> This is a about adding a delegation into the DNS securely so only
> the machine that the prefix is delegated to and the ISP can update
> it.  There are a number of reasons to want to do this securely from
> both the ISP side and the customer side regardless of whether you
> secure the DNS responses themselves.

And carrying TSIG key in DHCP reply is just secure from the both sides.

						Masataka Ohta



home help back first fref pref prev next nref lref last post