Re: [Add] [EXTERNAL] Re: draft-grover-add-policy-detection-00

Michael Sinatra <michael@brokendns.net> Tue, 16 July 2019 16:33 UTC

Return-Path: <michael@brokendns.net>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24C0A1208BA for <add@ietfa.amsl.com>; Tue, 16 Jul 2019 09:33:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bYbrgy8VlWNL for <add@ietfa.amsl.com>; Tue, 16 Jul 2019 09:33:38 -0700 (PDT)
Received: from burnttofu.net (burnttofu.net [IPv6:2607:fc50:1:9d00::9977]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 686821208B0 for <add@ietf.org>; Tue, 16 Jul 2019 09:33:38 -0700 (PDT)
Received: from elwha.brokendns.net (elwha.brokendns.net [IPv6:2607:f2f8:a544:0:0:0:0:2]) by burnttofu.net (8.15.2/8.15.2) with ESMTPS id x6GGXYLp044774 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NOT) for <add@ietf.org>; Tue, 16 Jul 2019 12:33:36 -0400 (EDT) (envelope-from michael@brokendns.net)
Received: from Michaels-MacBook-Pro.local (50-197-156-42-static.hfc.comcastbusiness.net [50.197.156.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elwha.brokendns.net (5.65c/IDA-1.4.4/5.63) with ESMTPSA id 69A115D948 for <add@ietf.org>; Tue, 16 Jul 2019 09:33:33 -0700 (PDT)
To: add@ietf.org
References: <CAChr6SwEUz9MrdRA0bnv9f-oNi0oUHkfRKjd9-o6jwhuckLXdw@mail.gmail.com> <CAFWeb9LNdT=EYVKTsYDxcBCQKoQFNShKotYtWujt4U9GA-V1mg@mail.gmail.com> <CAFWeb9+eWKSKY9O2JLn9-0+Zq7hrD48F-y+Y4T-iRaaF0vtdOA@mail.gmail.com> <A45F4F74-D6C1-435A-A52F-C2DEA82E2999@sky.uk> <CAFWeb9JVBj+Yehup5q4v9X-7XDY+02frd-04AQGL2HoSLON2qA@mail.gmail.com> <CABcZeBMY9q9vKGse1svzbvXF_dSHA+9q06j4ugDVCZP9VT1koQ@mail.gmail.com> <CAChr6Sz5Rfz=UxOYuPguSvVK2HCX2ZoA1-FytW7+EOUxN8y46Q@mail.gmail.com> <CABcZeBNB7ASu2U3ZMBZ+OOxEhbSnhDXwFN3Lsex1uzVSDv3R=Q@mail.gmail.com>
From: Michael Sinatra <michael@brokendns.net>
Message-ID: <c9c83673-c12e-0093-3873-0f2c03155fa5@brokendns.net>
Date: Tue, 16 Jul 2019 09:33:32 -0700
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.7.1
MIME-Version: 1.0
In-Reply-To: <CABcZeBNB7ASu2U3ZMBZ+OOxEhbSnhDXwFN3Lsex1uzVSDv3R=Q@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Greylist: Default is to whitelist mail, not delayed by milter-greylist-4.6.2 (burnttofu.net [IPv6:2607:fc50:1:9d00:0:0:0:9977]); Tue, 16 Jul 2019 12:33:36 -0400 (EDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/3l1dc6pj4aLI9P5JT9GAZdXJpzU>
Subject: Re: [Add] [EXTERNAL] Re: draft-grover-add-policy-detection-00
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jul 2019 16:33:40 -0000

On 7/16/19 8:38 AM, Eric Rescorla wrote:
> 
> 
> On Tue, Jul 16, 2019 at 8:24 AM Rob Sayre <sayrer@gmail..com 
> <mailto:sayrer@gmail.com>> wrote:
> 
> 
> 
>     On Tue, Jul 16, 2019 at 7:22 AM Eric Rescorla <ekr@rtfm..com
>     <mailto:ekr@rtfm.com>> wrote:
> 
>         Hi Alec,
> 
>         This is a good question.
> 
>         As I alluded to in my response to Robert Sayre, DoH has a difficult
>         deployment problem. Specifically, whether we like it or not,
>         there are
>         some environments in which DNS filtering is in place and the user
>         wants it that way (parental [0] or anti-malware filtering are good
>         examples of this).
> 
> 
>     Parental controls and malware detection are usually done on the device.
> 
>     https://www.apple.com/newsroom/2019/04/the-facts-about-parental-control-apps/
>     https://blog.google/products/chrome/cleaner-safer-web-chrome-cleanup/
> 
> 
> They are often done, but not always. For instance:
> https://www.xfinity.com/support/articles/set-up-parental-controls-with-comcast-networking
> https://www.quad9.net/faq/#How_does_Quad9_protect_me_from_malicious_domains

Also, note that parental controls are but one use-case.  There are a 
number of enterprises which require DNS-based filtering, *in addition 
to* other controls on the endpoint.  The entire USG and many of its 
contractors are required to do DNS filtering.  Many organizations that 
provide grants to educational institutions have conditions that the 
recipient of the grant must make efforts to "block porn" (and yes, 
that's about the extent of the definition).  DNS filtering is a very 
reasonable way of complying.  Institutional DNS filtering works well 
with DoT configured at the system level on the stub resolver, and 
supported by the institution.  DoH can be made compatible with 
institutional filtering requirements, but it can also easily skirt those 
requirements: the devil is in the defaults.

Mozilla, with its documented plans to circumvent institutional DNS with 
Mozilla-blessed services running DoH, exemplifies the case where the 
default behavior is going to be incompatible with institutional 
requirements and regulatory frameworks.  The result is predictable: 
Where endpoints are under strict control, Mozilla will be uninstalled 
and effectively banned.  Where endpoint controls are not as strict, 
attempts will be made to block well-known DoH services.  This is already 
being done in some sectors.

Unless we find ways of making DoH compatible with institutional 
controls, the banhammer will come down and we will end up in an arguably 
worse spot (think proxy decryption of all HTTPS, banning of certain 
browsers, blocking of well-known services, etc.).  Personally, I don't 
want that to happen, but I fear it will if we don't make DoH more 
flexible by default.

michael