Re: [Add] [EXTERNAL] Re: New Version Notification for draft-reddy-add-enterprise-split-dns-01.txt

Vittorio Bertola <vittorio.bertola@open-xchange.com> Tue, 16 March 2021 07:10 UTC

Return-Path: <vittorio.bertola@open-xchange.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2DC5B3A175C for <add@ietfa.amsl.com>; Tue, 16 Mar 2021 00:10:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=open-xchange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o9NwYC9LFQa8 for <add@ietfa.amsl.com>; Tue, 16 Mar 2021 00:10:18 -0700 (PDT)
Received: from mx4.open-xchange.com (alcatraz.open-xchange.com [87.191.39.187]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2294C3A1753 for <add@ietf.org>; Tue, 16 Mar 2021 00:10:17 -0700 (PDT)
Received: from imap.open-xchange.com (imap.open-xchange.com [10.20.28.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx4.open-xchange.com (Postfix) with ESMTPSA id A07DB6A292; Tue, 16 Mar 2021 08:10:15 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=open-xchange.com; s=201705; t=1615878615; bh=/wNB4Bpxv062qAJpAf5f2aVXBcj3upBeGiNx76nUt1Y=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=SS4YpGNdJaEpvdRFCIHJgZeukRUX/jKsDORd/pmFYRsVHJWR+MwWhrnRbBTohHmV/ jAywuKLg5CA7e/jLgRfS9HjADVotwev6Eh+xSlaObdoN+tx26hN2hz+gatAM7bX/h6 I0N1DCLR8QixHRAyMfNGmBV+Alp3j5tK9KmWzBUO40UTz6VMvywYVKzq9CzJLl+Nrm FQR0D8sTua1wk/yNgvfKPsmMe72zkqvPu4bOGxoFWy4kishHlV3HymVgdoxtoDHZkP 6IeBcOEEOIqgxTUlZh+nMIjuPqW3Ogt1HZd9zj5+7JBZxsP53Z/LIZjsl1hOZ1QHoy OTa8sx/BdY/TQ==
Received: from appsuite-gw1.open-xchange.com ([10.20.28.81]) by imap.open-xchange.com with ESMTPSA id JIMtJ9dZUGDWQQAA3c6Kzw (envelope-from <vittorio.bertola@open-xchange.com>); Tue, 16 Mar 2021 08:10:15 +0100
Date: Tue, 16 Mar 2021 08:10:15 +0100
From: Vittorio Bertola <vittorio.bertola@open-xchange.com>
To: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>
Cc: ADD Mailing list <add@ietf.org>
Message-ID: <165690859.41051.1615878615454@appsuite-gw1.open-xchange.com>
In-Reply-To: <CAHbrMsDuks_CekecsONR2USBk+TCyDy3xzdndbak2p8gsJnReQ@mail.gmail.com>
References: <1c618bd9-e039-2dac-80f3-1f11b7b44bc4@cs.tcd.ie> <9486D9AE-047B-4046-AB8A-74E8AB0D83B5@nohats.ca> <20210315021312.ng5xgq23kkohvsgb@family.redbarn.org> <1191373191.33078.1615799543805@appsuite-gw1.open-xchange.com> <CAHbrMsDuks_CekecsONR2USBk+TCyDy3xzdndbak2p8gsJnReQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_41049_1224941701.1615878615443"
X-Priority: 3
Importance: Normal
X-Mailer: Open-Xchange Mailer v7.10.5-Rev5
X-Originating-Client: open-xchange-appsuite
Autocrypt: addr=vittorio.bertola@open-xchange.com; prefer-encrypt=mutual; keydata= mQENBFhFR+UBCACfoywFKBRfzasiiR9/6dwY36eLePXcdScumDMR8qoXvRS55QYDjp5bs+yMq41qWV9 xp/cqryY9jnvHbeF3TsE5yEazpD1dleRbkpElUBpPwXqkrSP8uXO9KkS9KoX6gdml6M4L+F82WpqYC1 uTzOE6HPmhmQ4cGSgoia2jolxAhRpzoYN99/BwpvoZeTSLP5K6yPlMPYkMev/uZlAkMMhelli9IN6yA yxcC0AeHSnOAcNKUr13yXyMlTyi1cdMJ4sk88zIbefxwg3PAtYjkz3wgvP96cNVwAgSt4+j/ZuVaENP pgVuM512m051j9SlspWDHtzrci5pBKKFsibnTelrABEBAAG0NUJlcnRvbGEsIFZpdHRvcmlvIDx2aXR 0b3Jpby5iZXJ0b2xhQG9wZW4teGNoYW5nZS5jb20+iQFABBMBAgAqBAsJCAcGFQoJCAsCBRYCAwEAAp 4BAhsDBYkSzAMABQMAAAAABYJYRUflAAoJEIU2cHmzj8qNaG0H/ROY+suCP86hoN+9RIV66Ej8b3sb8 UgwFJOJMupZfeb9yTIJwE4VQT5lTt146CcJJ5jvxD6FZn1Htw9y4/45pPAF7xLE066jg3OqRvzeWRZ3 IDUfJJIiM5YGk1xWxDqppSwhnKcMOuI72iioWxX0nGQrWxpnWJsjt08IEEwuYucDkul1PHsrLJbTd58 fiMKLVwag+IE1SPHOwkPF6arZQZIfB5ThtOZV+36Jn8Hok9XfeXWBVyPkiWCQYVX39QsIbr0JNR9kQy 4g2ZFexOcTe8Jo12jPRL7V8OqStdDes3cje9lWFLnX05nrfLuE0l0JKWEg8akN+McFXc+oV68h7nu5A Q0EWEVH5QEIAIDKanNBe1uRfk8AjLirflZO291VNkOAeUu+dIhecGnZeQW6htlDinlYOnXhtsY1mK9W PUu+xshDq7lXn2G0LxldYwyJYZaJtDgIKqVqwxfA34Lj27oqPuXwcvGhdCgt0SW/YcalRdAi0/AzUCu 5GSaj2kaGUSnBYYUP4szGJXjaK2psP5toQSCtx2pfSXQ6MaqPK9Zzy+D5xc6VWQRp/iRImodAcPf8fg JJvRyJ8Jla3lKWyvBBzJDg6MOf6Fts78bJSt23X0uPp93g7GgbYkuRMnFI4RGoTVkxjD/HBEJ0CNg22 hoHJondhmKnZVrHEluFuSnW0wBEIYomcPSPB+cAEQEAAYkBMQQYAQIAGwUCWEVH5QIbDAQLCQgHBhUK CQgLAgUJEswDAAAKCRCFNnB5s4/KjdO8B/wNpvWtOpLdotR/Xh4fu08Fd63nnNfbIGIETWsVi0Sbr8i E5duuGaaWIcMmUvgKe/BM0Fpj9X01Zjm90uoPrlVVuQWrf+vFlbalUYVZr51gl5UyUFHk+iAZCAA0WB rsmACKvuV1P7GuiX3UV9b59T9taYJxN3dNFuftrEuvsqHimFtlekUjUwoCekTJdncFusBhwz2OrKhHr WWrEsXkfh0+pURWYAlKlTxvXuI7gAfHEQM+6OnrWvXYtlhd0M1sBPnCjbyG63Qws7Rek9bEWKtH6dA6 dmT2FQT+g1S9Mdf0WkPTQNX0x24dm8IoHuD3KYwX7Svx43Xa17aZnXqUjtj1
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/8HQvlHFVcKq0uG2OBC86BTLCne4>
Subject: Re: [Add] [EXTERNAL] Re: New Version Notification for draft-reddy-add-enterprise-split-dns-01.txt
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Mar 2021 07:10:20 -0000

>     Il 15/03/2021 16:09 Ben Schwartz <bemasc=40google.com@dmarc.ietf.org> ha scritto:
> 
> 
>     Many have raised the difficulty of establishing an identity for the network and confirming that claims received by the client were produced by the network operator.  That is a challenge, but it is not my principal concern.  My main concern is that when we move from encoding what the network offers to what it "allows", we are discussing the IETF blessing certain Terms of Service as technical standards.
> 
>     Terms of Service are a thoroughly human, legal construct, not a mechanical handshake.  They represent an unbounded conceptual space that cannot be neatly quantized into an IANA registry.  Their interpretation is subject to social norms and judges' rulings.  Does "splitDNSAllowed: false" forbid the use of corporate VPN tunnels?  DNS entries already in cache?  mDNS? Using "dig" over SSH?  Alternate DNS servers if needed due to a medical emergency?  Namecoin?  Does ignoring this JSON blob constitute a violation of the US Computer Fraud and Abuse Act?  I don't want answers; I want to make sure that we don't have to ask these questions.
> 
>     Standardizing Terms of Service opens Pandora's Box.  The list of things that someone somewhere wants to tell a user not to do on their network is endless, and the IETF should not be in the business of judging which of these requests are appropriate.  (And we surely must judge, as some requests are clearly unconscionable.)
> 
>     As a practical matter, no such request can command IETF consensus, nor the consensus of this working group.  That's why the ADD charter goes to some length to remind us not to be distracted by them.
> 
As I understand, we can at least develop the mechanism for transport of such information. As for the meaning, an indication that the network uses its own resolvers for network management purposes and would like applications to never use any other resolver (exactly like Mozilla's canary domain mechanism, just with a different transport) is not ambiguous and does not require any policy discussion, as "never" means "never"; it is then up to the client to decide whether to take it literally, to take it with some freedom, or not to take it at all - and while doing this, to evaluate any legal and policy implication in the specific context.

I don't see the need to standardize the meaning of this signal up to the level of detail that you envisage, but if that were required, I agree that it should not happen here. That kind of standardization of terms of service usually happens either under the form of industry certification/classification schemes, or by agreeing on industry-wide guidelines, or by regulation.

> 
>     If you want to invest in improving network identity attribution, let's ensure that when users are reviewing the network's Terms of Service, they know exactly who the network operator is.
> 
That would also be useful.

--

Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bertola@open-xchange.com mailto:vittorio.bertola@open-xchange.com 
Office @ Via Treviso 12, 10144 Torino, Italy