Re: [Add] [EXTERNAL] Re: New Version Notification for draft-reddy-add-enterprise-split-dns-01.txt

Ben Schwartz <bemasc@google.com> Mon, 15 March 2021 15:09 UTC

Return-Path: <bemasc@google.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A7743A122C for <add@ietfa.amsl.com>; Mon, 15 Mar 2021 08:09:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -22.599
X-Spam-Level:
X-Spam-Status: No, score=-22.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rfVxpHvEJv6s for <add@ietfa.amsl.com>; Mon, 15 Mar 2021 08:09:52 -0700 (PDT)
Received: from mail-wr1-x42b.google.com (mail-wr1-x42b.google.com [IPv6:2a00:1450:4864:20::42b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7ED583A122B for <add@ietf.org>; Mon, 15 Mar 2021 08:09:50 -0700 (PDT)
Received: by mail-wr1-x42b.google.com with SMTP id 7so8875549wrz.0 for <add@ietf.org>; Mon, 15 Mar 2021 08:09:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ufZliH7DuWpO7UkxTG1wdf40eTqlOepL1BKWBTDboOY=; b=ckAcd3O/jYZomRBvPzDx3ep54YHBbo3pXIKEWUKhlJWKtAKkqaowxasNRpbPh7iWCb NZ94jxIhGd5Nm1VpXbrSxgCYGaUUESmzZNdWGOIHs4I4IYLxodHfwgOT1sixT1fHmRxh OjoJw2yOAayJNLK9v/sOzJdr+LiRg361YEoqq1NvsbDfaKgPXY97WNJIOPEBEdwIR8wY bT+HPsmYGCm5PXVWR2RU8mG00ZcmbxWEOqSULyfN7LxniUCkyPrUKtswWeU+u3sLIMOp a8qIbyU065NJXczNmovqWf3DUBRyvNabI3mWiq+s1JpkkJPDOsb59k8doZBRguPzgnwr CFYQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ufZliH7DuWpO7UkxTG1wdf40eTqlOepL1BKWBTDboOY=; b=c9OeTsVuhjgeYbRTybnm1sUp7+KXoJ3ewU1GMX1dBKe3/rPvGcbCfCRlrAM8lru7se w2ZPPg9z9EZcpOA0aUQZ5UrqlAVTS0tMzQTyVH90Na1im+/BzYE3AX4/SXi0uN8h4yPT bDf/8L2WMoG7xU0KE7X9QSUHW+lzxCIJrV+CFA/1bi2a2ngmmD1w4nZgThJqvOkTaLQ3 Om4rGeNJSdper5zXSqW6xwAV6kJcLnH9bvFTg4IKdS32EyLjIm7fNVswQfhzy6Fia6ly mviDrQXyklgLcIK/TSNRTy/vHlve5BCiFcHqIl9E0vfP8RZfRUzMh1Ep0W0y2c787TeY qTpA==
X-Gm-Message-State: AOAM533u7+d7OcqGLfRcjyO0/Bf1hJ0kh/JJt8VySjccgEbq6vyBothu cxC1IqxY/+ZMo6vk8/+ITvF75EaGMwkniWEiUkF/dw==
X-Google-Smtp-Source: ABdhPJwnE9SUFBFyB+TmLNB3LHzF06OoD13++wfULx7iQCq7I1Oj6R1Qv4rZkC0rkAKWe8nloyYKmONOOxpuYRgUAzQ=
X-Received: by 2002:adf:e412:: with SMTP id g18mr129391wrm.159.1615820983500; Mon, 15 Mar 2021 08:09:43 -0700 (PDT)
MIME-Version: 1.0
References: <1c618bd9-e039-2dac-80f3-1f11b7b44bc4@cs.tcd.ie> <9486D9AE-047B-4046-AB8A-74E8AB0D83B5@nohats.ca> <20210315021312.ng5xgq23kkohvsgb@family.redbarn.org> <1191373191.33078.1615799543805@appsuite-gw1.open-xchange.com>
In-Reply-To: <1191373191.33078.1615799543805@appsuite-gw1.open-xchange.com>
From: Ben Schwartz <bemasc@google.com>
Date: Mon, 15 Mar 2021 11:09:32 -0400
Message-ID: <CAHbrMsDuks_CekecsONR2USBk+TCyDy3xzdndbak2p8gsJnReQ@mail.gmail.com>
To: Vittorio Bertola <vittorio.bertola=40open-xchange.com@dmarc.ietf.org>
Cc: Paul Vixie <paul@redbarn.org>, ADD Mailing list <add@ietf.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="000000000000c557c205bd94a330"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/42fip-_sKwzS3ZQD-p04MeYx0lo>
Subject: Re: [Add] [EXTERNAL] Re: New Version Notification for draft-reddy-add-enterprise-split-dns-01.txt
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Mar 2021 15:09:55 -0000

Many have raised the difficulty of establishing an identity for the network
and confirming that claims received by the client were produced by the
network operator.  That is a challenge, but it is not my principal
concern.  My main concern is that when we move from encoding what the
network offers to what it "allows", we are discussing the IETF blessing
certain Terms of Service as technical standards.

Terms of Service are a thoroughly human, legal construct, not a mechanical
handshake.  They represent an unbounded conceptual space that cannot be
neatly quantized into an IANA registry.  Their interpretation is subject to
social norms and judges' rulings.  Does "splitDNSAllowed: false" forbid the
use of corporate VPN tunnels?  DNS entries already in cache?  mDNS? Using
"dig" over SSH?  Alternate DNS servers if needed due to a medical
emergency?  Namecoin?  Does ignoring this JSON blob constitute a violation
of the US Computer Fraud and Abuse Act?  I don't want answers; I want to
make sure that we don't have to ask these questions.

Standardizing Terms of Service opens Pandora's Box.  The list of things
that someone somewhere wants to tell a user not to do on their network is
endless, and the IETF should not be in the business of judging which of
these requests are appropriate.  (And we surely must judge, as some
requests are clearly unconscionable.)

As a practical matter, no such request can command IETF consensus, nor the
consensus of this working group.  That's why the ADD charter goes to some
length to remind us not to be distracted by them.

If you want to invest in improving network identity attribution, let's
ensure that when users are reviewing the network's Terms of Service, they
know exactly who the network operator is.

On Mon, Mar 15, 2021 at 5:12 AM Vittorio Bertola <vittorio.bertola=
40open-xchange.com@dmarc.ietf.org> wrote:

>
>
> > Il 15/03/2021 03:13 Paul Vixie <paul@redbarn.org> ha scritto:
> >
> > a handset's inability to reliably know whom to trust on the local
> network can
> > be worked around. for example it's already trusting DHCP and SLAAC, so
> adding
> > more variables to those handshakes is not unreasonable.
>
> If you think at it, DHCP's purpose is exactly to let networks communicate
> policies to devices when they join them: "you must use the following IP
> address to communicate" and "you can use the following DNS resolvers to
> resolve names" are examples of policy messages that are currently
> transmitted. As an immediate step, we could just add new messages such as
> "you must not use any DNS resolver other than the ones I just suggested to
> you", which of course clients would then be free to decide whether to
> accept or ignore.
>
> Whether DHCP is adequate as a mechanism (in terms of security, for
> example) is then a different story; most of the world doesn't seem to have
> problems with it, but one could indeed think of replacing it with something
> else, for example something that can express in authenticated ways who is
> the owner of the network. I am not familiar with this space so I don't know
> if anything was attempted already, but that could indeed be a longer term
> effort worth pursuing.
>
> --
> Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
> vittorio.bertola@open-xchange.com
> Office @ Via Treviso 12, 10144 Torino, Italy
>
> --
> Add mailing list
> Add@ietf.org
> https://www.ietf.org/mailman/listinfo/add
>