SiteFinder: the Verisign Slides 23
Steve Loughran writes "It's been pretty quiet in public on the SiteFinder front, but it does
not mean that VeriSign are accepting defeat.
On October 15, the ICANN Security and Stability committee met to discuss it, as
can be seen from the long
transcript. The new item from this is a VeriSign
review of Site Finder,
which is very interesting." Loughran further analyzes the Verisign presentation, below.
Some key points:
- English-only responses only merits a 'moderate' response. I am sure the rest of the world thinks their language is only 'moderately' important.
- A lot of problems are viewed as minor, fixable with 'user education' or 'application patch'. I wonder if DNS patches were the application VeriSign expected us to patch?
- Apparently most spam doesnt forge sender domains; only 3-5%. So checking domain validity doesn't help much as an effective spam filter. A SpamAssassin representative commented that there are so few invalid domains in their corpus is that they get filtered earlier, so this data may be bogus.
- An acknowledged troublespot could be automated HTTP programs getting confused by the new responses, but they hadn't heard of that, and using HTTP over port 80 in this way by automated tool is discouraged according to BCP 56 .
- User studies liked it, but since the core finding was "there's more functionality than you get with a 404 so it's helpful for me", the study may have been flawed. Site Finder did nothing for 404 pages, only for unknown hosts.
- Most of the problems with services such as SMTP relate to misconfigured systems, and these did not show up with the small scale tests VeriSign tried.
I myself am most offended by the "we shouldn't be automating access over port 80" comment. Hello? VeriSign? What do you think Web Services are?
While Site Finder was up, I tested how SOAP stacks handled misconfigured addresses: the results are published on xml.com. Both SOAP stacks tested choked on the 302 response, giving errors to the clients that are nowhere near user intelligible. So VeriSign are making things harder, despite their apparent obliviousness or denials. I shall be sharing my data with VeriSign, and encourage anyone else to do the same."
Slashdot posting links to PowerPoint docs? (Score:2)
I wish Slashdot would make a policy against
Re:Slashdot posting links to PowerPoint docs? (Score:4, Informative)
Here is the google html cache [216.239.37.104] of it.
Re:Slashdot posting links to PowerPoint docs? (Score:2)
Another good reason (Score:2)
I mean, can you imagine the impact if a link to a virus-infected macro Word document was posted on Slashdot's main page.
Re:Another good reason (Score:2)
Re:Another good reason (Score:2)
Re:Another good reason (Score:2)
I use openoffice.org myself, so could handle the formats, and am reasonably immune from the problem.
Next time I submit I will identify PDF and SVG copies of the docs.
The transcript is in plain ascii, and very well transcribed. Its nice to see ICANN holding some meetings in public, along with a SpamAssassin rep joining in with some good comments.
Re:Slashdot posting links to PowerPoint docs? (Score:2)
Web Bugs are okay - Verisign.. (Score:4, Insightful)
He's not the only one. For one thing there are privacy implications _outside_ the US.
PDF of PowerPoint presentation (Score:2, Informative)
(posting anonymous - just say no to karma whoring)
Re:Oh, I *LOVE* this one... (Score:2)
Maybe verisign are planning on doing the education. I can image 30 second TV ads where a third tier movie star explains that 'sometimes, "connection refused" means "unknown host". But I cannot image verisign paying for it.
SiteFinder PPT (Score:1)
Putting too much trust into them? (Score:3, Informative)
I am sure that a lot of people will like Verisign's comments about handling traffic other than http.
Instead of returning a host not found, we will return another type of error (TCP reset for example) to the client application.
I know that some computer users know nothing about DNS, IP addresses, etc. But, who is there to say for sure that something will send a TCP reset? What if someone were to change it to now accept mail (using SMTP as an example)?
While it most likely won't happen, I can't trust these folks further than they can throw the person responsible for false renewal notices. I think the Verisign marketing departement takes the cake by coming up with the most destructive ideas to boost their bottom line.
Re:Putting too much trust into them? (Score:3, Insightful)
What if they started to reply to senders with suggestions for valid email addresses, maybe with adverts for ink cartridges at the bottom.
What if they cached all to and from addresses to add them to their list of 'consenting' users.
Verisigns perspective was if it is technically feasible, the
Re:Putting too much trust into them? (Score:1)
verisign blow. All this extra work for people just cause they want to make the sleazy buck, bastards.
Verisign's view on potential issues: (Score:1)
Issues more likely to occur with at least moderate impact & how addressed:
English-only web page
can be addressed by service operator
End-user error reporting
software update required
Spam filtering
filter update required
Automated HTTP tools
software update required
Resolvers with non-DNS fallback
software update required
Using DNS to check domain availability for registration purposes
software update required
Email delivery
most issues can be addressed by service operator
In other word
Re:Verisign's view on potential issues: (Score:3, Interesting)
Only one person in the transcript (read it, if you havent), asked 'what about the app developers -dont you have an implicit contract not to return wildcards', and Verisign replied "we only care about the standards", meaning no.
So the people who write the apps that make DNS lookups dont get consulted, dont get listened to, just get given extra work.
Yet if hadnt been for the app developers, th
'Appropriate Action...' (Score:1)
Anyone know of any good (preferably Open-Source) burn-down-Verisign's-headquarters software? I'm interested in embedding it in all my future applications.
Re: (Score:1)
DDoS sitefinder.verisign.com (Score:2)
Anyone know of any good (preferably Open-Source) burn-down-Verisign's-headquarters software?
Use a scriptable HTTP client, such as Wget or Curl, to bombard http://sitefinder.verisign.com:80/ with valid requests. I wrote a short C program [jk0.org] (no, I haven't had time to sit down with the llama book to learn Perl, and I needed a test case for my safe string library anyway) that does just this.
Verisign's totally objective surveys (Score:1)
It only stands to reason that if you want to claim everybody loves your new service, and if everybody doesn't, you ought to have to show some legitimate reason for claiming they do.
'course, being a mon