* [9fans] Are we ready for DNSSEC ?
@ 2010-01-20 13:26 maht
2010-01-20 13:42 ` erik quanstrom
2010-01-23 23:59 ` John Barham
0 siblings, 2 replies; 24+ messages in thread
From: maht @ 2010-01-20 13:26 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
By the end of May, all the root servers should be running DNSSEC
http://royal.pingdom.com/2010/01/19/the-internet-is-about-to-get-a-lot-safer/
Is Plan9 ready for such a move?
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-20 13:26 [9fans] Are we ready for DNSSEC ? maht
@ 2010-01-20 13:42 ` erik quanstrom
2010-01-20 15:14 ` Patrick Kelly
2010-01-23 23:59 ` John Barham
1 sibling, 1 reply; 24+ messages in thread
From: erik quanstrom @ 2010-01-20 13:42 UTC (permalink / raw)
To: 9fans
On Wed Jan 20 08:27:58 EST 2010, maht-9fans@maht0x0r.net wrote:
> By the end of May, all the root servers should be running DNSSEC
>
> http://royal.pingdom.com/2010/01/19/the-internet-is-about-to-get-a-lot-safer/
>
> Is Plan9 ready for such a move?
there are two answers to this:
yes, if you mean by this that plan 9 dns will continue to
operate.
no, if you mean by this that plan 9 dns will be able to use
or serve dnssec records.
one would likely need to start with a different structure
than ndb/dns currently has to get dnssec. but i think that
the most of the query logic could be reused.
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-20 13:42 ` erik quanstrom
@ 2010-01-20 15:14 ` Patrick Kelly
2010-01-20 15:33 ` erik quanstrom
0 siblings, 1 reply; 24+ messages in thread
From: Patrick Kelly @ 2010-01-20 15:14 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
On Jan 20, 2010, at 8:42 AM, erik quanstrom <quanstro@quanstro.net>
wrote:
> On Wed Jan 20 08:27:58 EST 2010, maht-9fans@maht0x0r.net wrote:
>> By the end of May, all the root servers should be running DNSSEC
>>
>> http://royal.pingdom.com/2010/01/19/the-internet-is-about-to-get-a-lot-safer/
>>
>> Is Plan9 ready for such a move?
>
> there are two answers to this:
>
> yes, if you mean by this that plan 9 dns will continue to
> operate.
>
> no, if you mean by this that plan 9 dns will be able to use
> or serve dnssec records.
>
> one would likely need to start with a different structure
> than ndb/dns currently has to get dnssec. but i think that
> the most of the query logic could be reused.
As I understand it; It is an extension, the base DNS stuff should not
change.
What would need to be changed in ndb, or would looking at the source
be better?
>
> - erik
>
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-20 15:14 ` Patrick Kelly
@ 2010-01-20 15:33 ` erik quanstrom
2010-01-20 16:39 ` Patrick Kelly
0 siblings, 1 reply; 24+ messages in thread
From: erik quanstrom @ 2010-01-20 15:33 UTC (permalink / raw)
To: 9fans
> > one would likely need to start with a different structure
> > than ndb/dns currently has to get dnssec. but i think that
> > the most of the query logic could be reused.
> As I understand it; It is an extension, the base DNS stuff should not
> change.
> What would need to be changed in ndb, or would looking at the source
> be better?
i think your understanding ma be incomplete. dnssec
requires that the rrs be chained together in a particular
order. and any change to a rr triggers resigning. it
may be doable, but i think it would be easier to start
with dnssec in mind.
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-20 15:33 ` erik quanstrom
@ 2010-01-20 16:39 ` Patrick Kelly
2010-01-20 16:49 ` erik quanstrom
2010-01-20 17:47 ` Russ Cox
0 siblings, 2 replies; 24+ messages in thread
From: Patrick Kelly @ 2010-01-20 16:39 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
On Jan 20, 2010, at 10:33 AM, erik quanstrom <quanstro@coraid.com>
wrote:
>>> one would likely need to start with a different structure
>>> than ndb/dns currently has to get dnssec. but i think that
>>> the most of the query logic could be reused.
>> As I understand it; It is an extension, the base DNS stuff should not
>> change.
>> What would need to be changed in ndb, or would looking at the source
>> be better?
>
> i think your understanding ma be incomplete. dnssec
> requires that the rrs be chained together in a particular
> order. and any change to a rr triggers resigning. it
> may be doable, but i think it would be easier to start
> with dnssec in mind.
That makes their use of the word extension wrong, but in that case
starting over would seem (and probably is) best.
Thanks.
>
> - erik
>
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-20 13:26 [9fans] Are we ready for DNSSEC ? maht
2010-01-20 13:42 ` erik quanstrom
@ 2010-01-23 23:59 ` John Barham
2010-01-24 0:42 ` erik quanstrom
1 sibling, 1 reply; 24+ messages in thread
From: John Barham @ 2010-01-23 23:59 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
> By the end of May, all the root servers should be running DNSSEC
>
> http://royal.pingdom.com/2010/01/19/the-internet-is-about-to-get-a-lot-safer/
>
> Is Plan9 ready for such a move?
Reading what D. J. Bernstein has to say about DNSSEC is always fun.
See e.g. this paper http://cr.yp.to/talks/2009.08.10/slides.pdf about
abusing DNSSEC to launch denial of service attacks. He has also
proposed an alternative to DNSSEC, http://dnscurve.org/.
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-23 23:59 ` John Barham
@ 2010-01-24 0:42 ` erik quanstrom
2010-01-24 0:52 ` Russ Cox
0 siblings, 1 reply; 24+ messages in thread
From: erik quanstrom @ 2010-01-24 0:42 UTC (permalink / raw)
To: 9fans
> > By the end of May, all the root servers should be running DNSSEC
> >
> > http://royal.pingdom.com/2010/01/19/the-internet-is-about-to-get-a-lot-safer/
> >
> > Is Plan9 ready for such a move?
>
> Reading what D. J. Bernstein has to say about DNSSEC is always fun.
> See e.g. this paper http://cr.yp.to/talks/2009.08.10/slides.pdf about
> abusing DNSSEC to launch denial of service attacks. He has also
> proposed an alternative to DNSSEC, http://dnscurve.org/.
this isn't a technical discussion. regardless of the merits,
they're not implementing dnscurve on the root servers.
they're implementing dnssec.
so if you're interested in securing dns, say to prevent ssl
mitm attacks, i only see three choices
1. hold your nose. do dnssec.
2. put your head in the sand.
3. convince the world to use dnscurve.
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 0:42 ` erik quanstrom
@ 2010-01-24 0:52 ` Russ Cox
2010-01-24 1:01 ` erik quanstrom
0 siblings, 1 reply; 24+ messages in thread
From: Russ Cox @ 2010-01-24 0:52 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
> so if you're interested in securing dns, say to prevent ssl
> mitm attacks, i only see three choices
> 1. hold your nose. do dnssec.
> 2. put your head in the sand.
> 3. convince the world to use dnscurve.
if the goal is avoiding ssl mitm attacks,
dns is the least of your worries. a mitm will
just take over the connection attempt for the
actual ip address. the solution there is
to implement proper ssl certificate chain checking.
russ
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 0:52 ` Russ Cox
@ 2010-01-24 1:01 ` erik quanstrom
2010-01-24 1:11 ` Russ Cox
0 siblings, 1 reply; 24+ messages in thread
From: erik quanstrom @ 2010-01-24 1:01 UTC (permalink / raw)
To: 9fans
> if the goal is avoiding ssl mitm attacks,
> dns is the least of your worries. a mitm will
> just take over the connection attempt for the
> actual ip address. the solution there is
> to implement proper ssl certificate chain checking.
doesn't work with the recent renegotiation bug.
it's a server attack, not a client attack. but i don't
think one can dismiss dns as a non-issue.
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 1:01 ` erik quanstrom
@ 2010-01-24 1:11 ` Russ Cox
2010-01-24 1:18 ` erik quanstrom
2010-01-24 18:14 ` Tim Newsham
0 siblings, 2 replies; 24+ messages in thread
From: Russ Cox @ 2010-01-24 1:11 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
On Sat, Jan 23, 2010 at 5:01 PM, erik quanstrom <quanstro@quanstro.net> wrote:
>> if the goal is avoiding ssl mitm attacks,
>> dns is the least of your worries. a mitm will
>> just take over the connection attempt for the
>> actual ip address. the solution there is
>> to implement proper ssl certificate chain checking.
>
> doesn't work with the recent renegotiation bug.
disable renegotiation.
> but i don't
> think one can dismiss dns as a non-issue.
dns is a non-issue if the rest of ssl is working.
dns is irrelevant if it isn't.
russ
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 1:11 ` Russ Cox
@ 2010-01-24 1:18 ` erik quanstrom
2010-01-24 13:19 ` hiro
2010-01-24 18:14 ` Tim Newsham
1 sibling, 1 reply; 24+ messages in thread
From: erik quanstrom @ 2010-01-24 1:18 UTC (permalink / raw)
To: 9fans
> > doesn't work with the recent renegotiation bug.
>
> disable renegotiation.
>
> > but i don't
> > think one can dismiss dns as a non-issue.
>
> dns is a non-issue if the rest of ssl is working.
> dns is irrelevant if it isn't.
the renegotiation bug is a protocol flaw. i'm
not so sure i trust ssl enough to decide i don't
care of dns gets hijacked.
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 1:18 ` erik quanstrom
@ 2010-01-24 13:19 ` hiro
2010-01-24 14:57 ` erik quanstrom
0 siblings, 1 reply; 24+ messages in thread
From: hiro @ 2010-01-24 13:19 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
so you need to have a more "secure" dns because you don't trust your ssl?
On Sun, Jan 24, 2010 at 2:18 AM, erik quanstrom <quanstro@quanstro.net> wrote:
>> > doesn't work with the recent renegotiation bug.
>>
>> disable renegotiation.
>>
>> > but i don't
>> > think one can dismiss dns as a non-issue.
>>
>> dns is a non-issue if the rest of ssl is working.
>> dns is irrelevant if it isn't.
>
> the renegotiation bug is a protocol flaw. i'm
> not so sure i trust ssl enough to decide i don't
> care of dns gets hijacked.
>
> - erik
>
>
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 13:19 ` hiro
@ 2010-01-24 14:57 ` erik quanstrom
2010-01-24 21:49 ` Russ Cox
0 siblings, 1 reply; 24+ messages in thread
From: erik quanstrom @ 2010-01-24 14:57 UTC (permalink / raw)
To: 9fans
On Sun Jan 24 08:21:50 EST 2010, 23hiro@googlemail.com wrote:
> so you need to have a more "secure" dns because you don't trust your ssl?
do you feel dnssec provides the same or worse security? why?
the simple answer to your question is yes. the renegotiation bug
in ssl requires you to start talking to the wrong server. (this attack
wouldn't be necessary if you're attacker is behind the ssl termination pts.)
a similar attack could work against imperfect certificate checking.
since the easiest way to get someone to the wrong place is to give
them the wrong address, i think a more secure dns helps.
as to fixing the renegotiation bug by turning it off: do you feel
confident that you know how to do this (is it possible) with every
bit of ssl-capable equipment you own? i don't. i also don't think
it's the only attack than can be facilitated by first owning dns.
more food for thought. the ca chains just aren't that well-verified. it
was easy enough to get a bogus microsoft certificate a few years
back. if you can own dns, and get a bogus bigco.com cert, you're
in business.
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 14:57 ` erik quanstrom
@ 2010-01-24 21:49 ` Russ Cox
2010-01-24 22:12 ` Tim Newsham
0 siblings, 1 reply; 24+ messages in thread
From: Russ Cox @ 2010-01-24 21:49 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
you are changing the topic.
your original mail claimed to be worried
about man-in-the-middle attacks. that means
the attacker can respond to arbitrary traffic;
the fact that you can verify the dns response
is irrelevant if when you try to connect to the
correct ip address the attacker handles it
and you don't take advantage of ssl certificates
to catch that.
russ
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 21:49 ` Russ Cox
@ 2010-01-24 22:12 ` Tim Newsham
2010-01-24 22:20 ` erik quanstrom
0 siblings, 1 reply; 24+ messages in thread
From: Tim Newsham @ 2010-01-24 22:12 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
> you are changing the topic.
>
> your original mail claimed to be worried
> about man-in-the-middle attacks. that means
> the attacker can respond to arbitrary traffic;
> the fact that you can verify the dns response
> is irrelevant if when you try to connect to the
> correct ip address the attacker handles it
> and you don't take advantage of ssl certificates
> to catch that.
True, unless DNS provides a certificate that is bound
to the session in some way.
> russ
Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 22:12 ` Tim Newsham
@ 2010-01-24 22:20 ` erik quanstrom
0 siblings, 0 replies; 24+ messages in thread
From: erik quanstrom @ 2010-01-24 22:20 UTC (permalink / raw)
To: 9fans
On Sun Jan 24 17:15:17 EST 2010, newsham@lava.net wrote:
> > you are changing the topic.
> >
> > your original mail claimed to be worried
> > about man-in-the-middle attacks. that means
> > the attacker can respond to arbitrary traffic;
> > the fact that you can verify the dns response
> > is irrelevant if when you try to connect to the
> > correct ip address the attacker handles it
> > and you don't take advantage of ssl certificates
> > to catch that.
>
> True, unless DNS provides a certificate that is bound
> to the session in some way.
if one misdirects the original connection via dns and
then uses the renegotiation bug, is this not a
mitm attack?
- erik
^ permalink raw reply [flat|nested] 24+ messages in thread
* Re: [9fans] Are we ready for DNSSEC ?
2010-01-24 1:11 ` Russ Cox
2010-01-24 1:18 ` erik quanstrom
@ 2010-01-24 18:14 ` Tim Newsham
2010-01-25 20:45 ` Wes Kussmaul
1 sibling, 1 reply; 24+ messages in thread
From: Tim Newsham @ 2010-01-24 18:14 UTC (permalink / raw)
To: Fans of the OS Plan 9 from Bell Labs
> dns is a non-issue if the rest of ssl is working.
> dns is irrelevant if it isn't.
Except when SSL has chinks in its armor. Like incidents of
certificate authorities being convinced to give out certs for
domains that don't belong to the requestor. Or bugs in SSL
cert validation that compares names only up to the NUL character
and certificate authorities willing to make CERTs with NULs
in the cert name. Or certificate authorities giving out unqalified
"local" certificates that can be repurposed as non-local certs.
Or simply the fact that the majority of the
SSL using population has been trained to disreguard SSL mismatches
by clicking through any dialog box that appears while browsing.
At any rate, it would be nice having a certificate system that
was more closely tied to the DNS heirarchy...
> russ
Tim Newsham | www.thenewsh.com/~newsham | thenewsh.blogspot.com
^ permalink raw reply [flat|nested] 24+ messages in thread
end of thread, other threads:[~2010-01-25 20:45 UTC | newest]
Thread overview: 24+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2010-01-20 13:26 [9fans] Are we ready for DNSSEC ? maht
2010-01-20 13:42 ` erik quanstrom
2010-01-20 15:14 ` Patrick Kelly
2010-01-20 15:33 ` erik quanstrom
2010-01-20 16:39 ` Patrick Kelly
2010-01-20 16:49 ` erik quanstrom
2010-01-20 17:29 ` Patrick Kelly
2010-01-20 17:47 ` Russ Cox
2010-01-20 18:17 ` erik quanstrom
2010-01-20 20:11 ` Russ Cox
2010-01-20 19:13 ` Patrick Kelly
2010-01-23 23:59 ` John Barham
2010-01-24 0:42 ` erik quanstrom
2010-01-24 0:52 ` Russ Cox
2010-01-24 1:01 ` erik quanstrom
2010-01-24 1:11 ` Russ Cox
2010-01-24 1:18 ` erik quanstrom
2010-01-24 13:19 ` hiro
2010-01-24 14:57 ` erik quanstrom
2010-01-24 21:49 ` Russ Cox
2010-01-24 22:12 ` Tim Newsham
2010-01-24 22:20 ` erik quanstrom
2010-01-24 18:14 ` Tim Newsham
2010-01-25 20:45 ` Wes Kussmaul
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).