[81023] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: soBGP deployment

daemon@ATHENA.MIT.EDU (Edward Lewis)
Mon May 23 14:34:18 2005

In-Reply-To: <BEB7926C.BD59%dgolding@burtongroup.com>
Date: Mon, 23 May 2005 14:33:32 -0400
To: Daniel Golding <dgolding@burtongroup.com>
From: Edward Lewis <Ed.Lewis@neustar.biz>
Cc: <bmanning@vacation.karoshi.com>, <nanog@nanog.org>
Errors-To: owner-nanog@merit.edu


At 14:00 -0400 5/23/05, Daniel Golding wrote:

My reply is mostly tongue-in-cheek.  I think it's always healthy to 
explore alternatives.

>Why not do something simple? The in-addr.arpa reverse delegation tree is
>pretty accurate. We use it for lots of different things. Why not just give
>IP address blocks a new RR (or use a TXT record) to identify ASN? This
>solves the biggest problem we have right now, which is stealing of address
>blocks. It requires little processor overhead, and only a few additional DNS
>lookups. Its reasonably foolproof.

I'll ignore that you said "(or use a TXT record)". ;)

Without DNSSEC, what does this buy?  "Secure" information on a 
non-secure channel.

If, by "stealing addresses" you mean that the RIR records are 
changed, then changing the name servers is trivial - changing to 
servers that have the hijacker's preferred data (or none!).

>Why create reliance on more databases? The RIRs are iffy. We rely on DNS
>right now. Why not keep relying on it? This solution doesn't solve all of
>our problems, but it does help, its easy, and people will implement it.

Who populates the DNS (well, the .arpa domain)?  The RIRs do.

>Ok, please start flaming now :)

Brave to make such a request on a Monday afternoon.
-- 
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                +1-571-434-5468
NeuStar

If you knew what I was thinking, you'd understand what I was saying.

home help back first fref pref prev next nref lref last post