Re: [Add] Fwd: New Version Notification for draft-reddy-dprive-dprive-privacy-policy-00.txt

tirumal reddy <kondtir@gmail.com> Mon, 07 October 2019 09:51 UTC

Return-Path: <kondtir@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20E1B1200B7 for <add@ietfa.amsl.com>; Mon, 7 Oct 2019 02:51:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BlwS6edG5F-R for <add@ietfa.amsl.com>; Mon, 7 Oct 2019 02:51:40 -0700 (PDT)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 213201200C4 for <add@ietf.org>; Mon, 7 Oct 2019 02:51:39 -0700 (PDT)
Received: by mail-io1-xd34.google.com with SMTP id c6so27019242ioo.13 for <add@ietf.org>; Mon, 07 Oct 2019 02:51:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8f+bX1+2tKAQD378VF0vtYL96J8xUxKRc69fiyEmMFM=; b=iQnSfHFRWneVrR7UaQuhZuC/dOVc2ZDykXPzaANx3IaK2K61eXMEVO68LclZkFXpg5 L85BSUK++jIYFEBS1vxcECpIqv01zwmUICP9q0CponhqUs1EMTMjJS/FxX3K6k1YSbZ/ 3EsbIZYgRHz5pBHZbLx8m03ajcGOFWUJ56piJBkAbHvouzLnngdVfVaFZWt0uFlNsXD5 U+ffpZZq52lrD/NjqBoToc4JMsXFoSLxuuRkiEHTqfBZUpRojgwR/ssWA/YaxzO8IvwL yNWBNgU2Q1DV7SV97Q52QaFu6DXzyHTTClBuFgLmIaBI9ho4/Xp0b7Gg1AjjcTqQFi65 bNCg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8f+bX1+2tKAQD378VF0vtYL96J8xUxKRc69fiyEmMFM=; b=RBsJk/JwL/2qGuJUjTdiCNFAISfF9LVChYJOUyYB/nq3DnqcpPfVyRV+JUK2DUa5Ko 8ms4bksdhsunKNMs0Jbx4saAyVHa4z5qKZiUm4xx7h5YaT8KoV1tUYcWMIgWiThpyPZ3 syftEjD6AdHRIaFkBrz6i0jt4ptPJWPsH65aF4lXs6AbmPxAVCzHDwyXbTQbBBQlVIdv NA/CChHY7onj5LdniT9lc561jfKPSQtyB1U4037xtVXN8ix0dSaCiC0N3BSzumv5pPpU UZSgsR9cAaclXnqXqnorhUhEXFpSn2NIKwlPpNqLznJoPBZuBChqHwuUTDBawZ7CcaIh emBA==
X-Gm-Message-State: APjAAAVWsX1OoNjX160g/iGpAnx3hTYqnRG8NSLTb5lBgm2D2t79MDM8 tGyjA09xS/kUDmsUaHCv3nX1WYZIVIScEDi5bQBMEhc1
X-Google-Smtp-Source: APXvYqymMqHwvksZCY7MpRhesVJQYpZFXqGb5/C4JFu0qTjOGt5lBVWfV7AQHuyNQhkx+ephGR8tGuNDleaqoW70ccE=
X-Received: by 2002:a6b:7a05:: with SMTP id h5mr23072826iom.32.1570441899128; Mon, 07 Oct 2019 02:51:39 -0700 (PDT)
MIME-Version: 1.0
References: <157009854908.16293.4269133049514081713.idtracker@ietfa.amsl.com> <CAFpG3gdpYASvfz_ey=fsh6+8LQ11EJGyU-dVxH7_1QmVeiAQKg@mail.gmail.com> <alpine.LRH.2.21.1910051351420.26913@bofh.nohats.ca>
In-Reply-To: <alpine.LRH.2.21.1910051351420.26913@bofh.nohats.ca>
From: tirumal reddy <kondtir@gmail.com>
Date: Mon, 07 Oct 2019 15:21:26 +0530
Message-ID: <CAFpG3gfLLkdZt-b+r=8RY8a+yoJx2tzQOevnOLkNQSm9g9QuDw@mail.gmail.com>
To: Paul Wouters <paul@nohats.ca>
Cc: ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000089baae05944eff11"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/4a62RBzCVzDXP8aAPVgXGJ_WYOM>
X-Mailman-Approved-At: Mon, 07 Oct 2019 07:06:22 -0700
Subject: Re: [Add] Fwd: New Version Notification for draft-reddy-dprive-dprive-privacy-policy-00.txt
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Oct 2019 09:51:42 -0000

Hi Paul,

Please see inline

On Sat, 5 Oct 2019 at 23:28, Paul Wouters <paul@nohats.ca> wrote:

> On Sat, 5 Oct 2019, tirumal reddy wrote:
>
> > We have published
> https://tools.ietf.org/html/draft-reddy-dprive-dprive-privacy-policy-00 that
> discusses a mechanism for the
> > DNS server to communicate its cryptographically signed privacy policy
> information to a DNS client. By evaluating the DNS
> > privacy policy and the signatory, the DNS client can choose to  select
> or avoid a DoT/DoH server if it doesn't comply with
> > the client's privacy expectations.
>
> Section 10 Security Considerations describes well why I think this is
> not a good idea. Publishing a privacy policy in a computer consumable
> way has no relationship to the actual DNS server's privacy policy
> used.
>

No, the privacy policy also conveys a URL that points to the human readable
privacy policy formation of the DNS server. Public DNS resolvers have
published privacy policy statements (for example, see
https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/firefox/).
If a firm violates the privacy claims, it will most likely face penalty
(similar to FTC imposing fine on facebook).


>
> This is not a technical wire problem to solve with an RFC. It is a
> social-economic issue. Can we trust vendor X? And vendor X making
> claims in JSON about this isn't useful from a technical point of
> view, no matter how or where and with what such statements are
> (self)signed.
>

Not really, you probably missed the privacy consideration section. User
consent is mandatory to use the discovered DoT/DoH servers, the section
says the following:

   Users are expected to indicate to their system in some way that they
   trust certain PAT signers (e.g., if working for Example, Inc., the
   user's system is configured to trust example.com signing the PAT).
   Separately, the user is expected to indicate to their system their
   PAT privacy requirements (e.g., logging, etc.).  By doing so, thee DNS
   client can automatically discover local DNS-over-TLS or DNS-over-
   HTTPS server, validate the PAT signature and check if the PAT
   complies with user's privacy needs, prior to using that DNS-over-TLS
   or DNS-over-HTTPS server for DNS queries.


Cheers,

-Tiru




> It's a great topic for consumer advocay organisations, the EFF or
> ACLU or EU commisioners. I do not think this is a technical problem
> needing a technical standard from the IETF. And any automated
> consumption of this leading to changed DNS client behaviour would
> be dangerous.
>

> Paul
>