ietf
[Top] [All Lists]

Re: Last Call: draft-jabley-reverse-servers (Nameservers for IPv4 and IPv6 Reverse Zones) to Proposed Standard

2010-01-05 11:05:34
On 2010-01-04 at 06:08 -0800, The IESG wrote:
The IESG has received a request from an individual submitter to consider 
the following document:

- 'Nameservers for IPv4 and IPv6 Reverse Zones '
   <draft-jabley-reverse-servers-01.txt> as a Proposed Standard

First an editorial nit, there's an arithmetic error.  Then a security
nit.

   The non-compressed representation of A.IP6-SERVERS.ARPA fills (1 + 1)
   + (10 + 1) + (4 + 1) + 1 = 19 bytes.

"IP6-SERVERS" is 11 characters long.  The encoded sequence is 20 octets,
not 19.

This then leads into adjustments to the relevant table below, with
{A-F}.IP6-SERVERS.ARPA totalling 40 octets.


Security nit: the Security Considerations section states that there are
no new security considerations.  This is false.  Currently, five diverse
names control the top-level delegation and in the event of a major
dispute, the geopolitical diversity of the chosen names means that one
rogue actor can be partially inhibited by a split -- the same protection
that was afforded by the original choice of root nameserver operators.

The draft centralises the naming and thus the choice of delegation and
so creates a new privileged operator.  Changing the delegation would no
longer require update to the NS glue in the ARPA zone; instead in
practice a change could be imposed by the operator, provided they can
live with inconsistent A/AAAA glue until the topic of dispute is no
longer disputed; given the complete control, this would almost certainly
be settled in favour of the de facto new state of affairs.

For the root zone, the actual NS records and glue used are widely spread
amongst resolvers, so the same hijack is infeasible.  For the GTLD
servers, there's one central registry in any case.  For the current
IN-ADDR.ARPA. servers, the root-servers.net values are used, which are
the same hosts for which there is a widespread dispersal of the current
correct IP addresses and for which change comes very slowly.

This draft represents a change in the threat boundaries for a unilateral
future power-grab over the reverse DNS.  I'm not deliberately impugning
any of the current operators, ICANN or anyone else who reads this and is
offended; organisations can be replaced, 5, 20 or 50 years from now and
the centralised control remains.  Postel's dispersion of control should
not be so readily undone piecemeal.

At the very least, surely this warrants discussion in the Security
Considerations?

Regards,
-Phil
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf

<Prev in Thread] Current Thread [Next in Thread>