To:
Paul Vixie <paul@vix.com>
Cc:
dnssec@cafax.se
From:
Ben Laurie <ben@algroup.co.uk>
Date:
Tue, 22 Jun 2004 13:25:34 +0100
In-Reply-To:
<20040622003134.95D9713E1B@sa.vix.com>
Sender:
owner-dnssec@cafax.se
User-Agent:
Mozilla Thunderbird 0.6 (Windows/20040502)
Subject:
Re: continued: rrsig(qtype)
Paul Vixie wrote: >>>Anything not getting DNSSEC into an RFC is a problem. Postponing >>>DNSSEC for another year by fixing this corner case of abuse is going >>>to give me a LOT more spam then the amount of spam I would get when >>>DNSSEC is deployed and people can start using things like SPF >>>records. > > > for the record, i do not expect spf to stop much spam, though it might > prevent some forgeries. but i've been told that i'm just bitter about > the ignorance of the FUSSP community and their reluctance to even bother > to read my own prior work in this area ("mailfrom"). but, we digress. > > >>Why is DNSSEC required for SPF? > > > the ways in which the traditional (non-secure) query model is vulnerable are: > > 1. an attacker can cause your query, or your response, to not be received. > 2. an attacker can cause you to believe that nonauthentic data is authentic. > 3. an attacker can cause you to believe that authentic data does not exist. > > (that's roughly microburst ddos, query-id guessing, and query-id guessing.) > > dnssec-bis proposes to solve #2 and #3. > > several people concerned about zone walking are considering just solving #2. Purely as an interim measure. I think we all agree that 2 & 3 should be solved. > at the moment, no public proposal claims to address #1. > > forgetting zone walking for the moment, and therefore, forgetting the > distinction between #2 and #3, and sort of smashing them together into > a single lump, it's clear that any "dns-based antispam solution" which > is susceptible to #1 won't benefit from any sort of dnssec -- and might > as well not even be tried, since microburst-ddos can accompany spam runs > and all such filtering would do is increase pollution in the internet core. > > therefore we're left with the #2/#3 blob. perhaps SPF is susceptible to #1, > and is something that will stop helping you whenever someone microbursts you. > that wouldn't surprise me but i really don't know. > > there are however ways in which "authenticated and reachable" can be made > a prerequisite for inbound e-mail, such that attack #1 would cause delay but > no leaks or losses. in this sense, some form of DNSSEC could be wildly > helpful in deploying certain imaginable anti-spam solutions. DNSSEC can certainly help with imaginable attacks against some proposed anti-spam solutions, but it isn't required for them. BTW, I don't suppose I'll be all that upset if my spam is delayed, so the general form of the solution works for me. :-) Cheers, Ben. -- http://www.apache-ssl.org/ben.html http://www.thebunker.net/ "There is no limit to what a man can do or how far he can go if he doesn't mind who gets the credit." - Robert Woodruff