Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month at the Massachusetts Institute of Technology, in Building E51.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] free SSL certs from the EFF



Richard Pieri <richard.pieri at gmail.com> writes:

> On 12/3/2014 4:08 PM, Matthew Gillen wrote:
>
>> The second issue was that DNSSEC has a built-in way to MITM it, where an
>> intermediary could strip out the info that indicated that a given domain
>> had DNSSEC records (the claim was this was forced for compatibility).  I
>> think Derek refuted that, and I have to believe that
>> what Richard claimed would defeat the whole purpose of DNSSEC.
>
> Correct. Either you enforce DNSSEC and drop yourself into a black hole
> when a script kiddie plays games with UDP packets or you configure
> your security aware resolver to treat unsigned and stripped DNS
> answers as valid anyway. The former is not "protection"; it's locking
> your computer in a safe filled with concrete and dumping it down the
> Marianas Trench. The latter, well, what's the point of DNSSEC if
> you're going to ignore it?

A script kiddie is only going to be able to send forged additional
responses, but not necessarily block the *real* responses or modify them
enroute.  So yes, I still want to ignore the unsigned responses in this
scenario because the real responses *WILL* eventually get through.
Besides, with random ports and random TIDs a script kiddie has much less
of a chance of getting through.

Yes, there are broken middleware boxes (most often in hotels) that can
intercept and manipulate DNS.  Personally I'd like to know when that's
happening to me, and DNSSEC can absolutely tell me that.  Then I can
make a conscious choice of what to do with that information (including
opening myself up to attack).

Eventually those middleboxes will go away -- they've already been going
away slowly.

> Either way, DNSSEC really is pointless for end users.

Bzzt.  You keep coming back to "pointless for end users" mantra when in
reality it was absolutely designed to help end users.  You're welcome to
continue to think that to yourself (there's no such thing as a thought
police, yet) but please stop spreading your FUD around as fact.  It's
not helping anyone.  Many people have already pointed out many ways that
it helps end users.  I can list many more if you wish, but if you're not
going to listen it's not worth my time, I have real security work to get
back to.

-derek

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord at MIT.EDU                        PGP key available



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org