- From: <jg@w3.org>
- Date: Tue, 26 Mar 96 12:13:07 -0500
- To: http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com
JG DNS
Issue:
<A href="http://www.w3.org/pub/WWW/Protocols/HTTP/Issues/dns-usage.txt">
spec is silent about
clients/servers caching of DNS information.</A>
<BR>
Status: resolution is to add verbiage that implemeters who cache
DNS information inside an implementation, rather than using DNS
lookups each time MUST obey DNS TTL rules. Add words as well
to security considerations.
I've written a section outlining this requirement; it is currently
a sub-section to be added to the security considerations section,
as there seems to be no general discussion of how servers are contacted
elsewhere in the document. If people think it necessary, I can
add such a section to the document, but this seems the easiest way to
close the issue.
- Jim Gettys
Proposed resolution:
====================
Section 14 (new subsection to Security Considerations):
DNS Spoofing
------------
HTTP use relies heavily on the Internet's name service (DNS), and is prone to
the attacks generally possible via name server attack.
DNSSEC deployment should improve this situation.
The current implementation of many HTTP 1.0 client libraries are prone
to a particular attack, however.
HTTP clients should generally rely on their system's name resolver for
lookup when contacting a server, rather than caching the result of host
name lookups. Many platforms already cache the results of name
lookups locally, or can (and should) be configured to do so.
If clients cache the results of name lookups for performance
reasons, HTTP clients MUST observe the TTL (Time To Live) information
reported by the name server.
A server could be spoofed when that server's IP address
changes if this rule is not observed. As renumbering is
expected to become increasingly common [RFC 1900],
this problem will grow. This requirement reduces this
potential security vulnerability.
This requirement also reduces failures observed by users,
and improves load-balancing behavior of clients for replicated servers
hiding behind the same DNS name, as often occurs with large loaded
HTTP servers.
Section 16: (References)
[RFC 1900]
B. Carpenter, Y. Rekhter,
<a href="http://info.internet.isi.edu:80/in-notes/rfc/files/rfc1900.txt">
Renumbering Needs Work</a>. RFC 1900, IAB, February 1996.
Section 16: (References)
[RFC 1900]
B. Carpenter, Y. Rekhter,
<a href="http://info.internet.isi.edu:80/in-notes/rfc/files/rfc1900.txt">
Renumbering Needs Work</a>. RFC 1900, IAB, February 1996.
Received on Tuesday, 26 March 1996 09:18:09 UTC