Re: [Add] meeting hum: should the IETF take up this work?

Tommy Jensen <Jensen.Thomas@microsoft.com> Tue, 23 July 2019 22:42 UTC

Return-Path: <Jensen.Thomas@microsoft.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86EB9120932 for <add@ietfa.amsl.com>; Tue, 23 Jul 2019 15:42:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id euuKHxut39gu for <add@ietfa.amsl.com>; Tue, 23 Jul 2019 15:41:58 -0700 (PDT)
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-eopbgr800092.outbound.protection.outlook.com [40.107.80.92]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B2F3120915 for <add@ietf.org>; Tue, 23 Jul 2019 15:41:58 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Qbll9h8EVmKrq402e8A7uB6O6QHt/1l5UbeHwe24zbFD1wK8YqvwDeq2bUDyv5YXjhupN5zBHwZbi9ThafOMCzatxVPpLjV7r1fjisECrYa1Vs+KYt5wnoVGcOtaHzJwaWdCuGgkb0RGC69q+PuLd154pFdUU1/SQUrZaAzzYeFtJhmiAYAwyy/PeoQp2waFCb2vd9za59lLNrkYXsSIE2btYRkRQAswT2zmpTu20ZJS6xoUBWVAxoar/xhyYDa4QNsriOFqFH+K3rXwj+ppKbbNffg46c04PJsygxRUBORPCin2iimKGoBKsiB+MgoJvhjBs0wXKUW032/JbsxN/A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Na+MYa9t3MtGfqdOx9ztVRc68Lk5cOHr+sv4Z5SRetA=; b=GTVEnJt16tVO+BmuAkjsSZv46fuJzq1tpOf0YgsrK+Thr5amN3Mdg6M93wSzY63uNZtGz3Pnif55Ul1SbxAGV+rLVhtwWc2h0cYJgec8tmBqEd0bMF8q4a4Ublqvyxj16qvAEXo5kZPYGXCUHvBMJ2UbDBHhSP1d8qDRhU7irpkRyBlglyK2k/qRqHlNnj2ZZNttgvHizStIarSDG3pfh+anVUeMYSAaoucVIlsShDe34WDUt4pDwPtEK2DZGQml5uYAgUMvqmPJlZwQLJlf5lMD63v/ngKlbabDfQXn6EguY2v60IKPdx484RTEczjuInJuGhQiyXpeGGzTJKgiCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1;spf=pass smtp.mailfrom=microsoft.com;dmarc=pass action=none header.from=microsoft.com;dkim=pass header.d=microsoft.com;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Na+MYa9t3MtGfqdOx9ztVRc68Lk5cOHr+sv4Z5SRetA=; b=IOMy8B3llIGWqdnGOoW9T7sQYVlVQkjhzEWuir0Qiisa9aEgwrXrbvYJ6ZzIoMsFd9pvVpJ9mZhEhOtMD+mrPwNZhbTIpUm4WYLT/38WdWWl1uqBfQY5aZNHI5K1/4AvDE9qdLohsxtRyUBS5+yNGDM+Aar1j3/FEKyrJXpMuAE=
Received: from MN2PR21MB1213.namprd21.prod.outlook.com (20.179.20.141) by MN2PR21MB1151.namprd21.prod.outlook.com (20.178.255.96) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2136.1; Tue, 23 Jul 2019 22:41:56 +0000
Received: from MN2PR21MB1213.namprd21.prod.outlook.com ([fe80::24eb:3b4c:428b:8fde]) by MN2PR21MB1213.namprd21.prod.outlook.com ([fe80::24eb:3b4c:428b:8fde%9]) with mapi id 15.20.2136.000; Tue, 23 Jul 2019 22:41:56 +0000
From: Tommy Jensen <Jensen.Thomas@microsoft.com>
To: Michael Sinatra <michael@brokendns.net>, Rob Sayre <sayrer@gmail.com>, "add@ietf.org" <add@ietf.org>, Barry Leiba <barryleiba.mailing.lists@gmail.com>
Thread-Topic: [Add] meeting hum: should the IETF take up this work?
Thread-Index: AQHVQaN8kWmupV0tjEGUNFuGH/v/XqbYyp0AgAAAeMc=
Date: Tue, 23 Jul 2019 22:41:56 +0000
Message-ID: <MN2PR21MB121355B91BC9F6B4DF882CD8FAC70@MN2PR21MB1213.namprd21.prod.outlook.com>
References: <CAChr6Sx9TEt6CMzRRrdb-HwT_k987oW=4yF1FCbDF17zkaE2Vg@mail.gmail.com>, <be403a12-08e0-19dd-f62f-a34cec031b04@brokendns.net>
In-Reply-To: <be403a12-08e0-19dd-f62f-a34cec031b04@brokendns.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Jensen.Thomas@microsoft.com;
x-originating-ip: [2601:600:a080:7f23:e8:386d:b300:891e]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4aba9269-5e23-4123-0792-08d70fbef74f
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:MN2PR21MB1151;
x-ms-traffictypediagnostic: MN2PR21MB1151:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <MN2PR21MB1151B7FA01B4972A9E6F991CFAC70@MN2PR21MB1151.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0107098B6C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(346002)(396003)(376002)(366004)(136003)(39860400002)(199004)(189003)(9686003)(55016002)(6116002)(229853002)(6436002)(236005)(54896002)(6306002)(186003)(966005)(76176011)(99286004)(478600001)(53546011)(256004)(53936002)(33656002)(110136005)(6506007)(7696005)(6246003)(22452003)(102836004)(10290500003)(316002)(8676002)(14454004)(8936002)(5660300002)(81166006)(81156014)(66574012)(10090500001)(68736007)(76116006)(8990500004)(52536014)(2501003)(66946007)(66476007)(66556008)(64756008)(66446008)(2906002)(19627405001)(486006)(476003)(71200400001)(71190400001)(74316002)(446003)(11346002)(105004)(25786009)(7736002)(86362001)(606006)(46003); DIR:OUT; SFP:1102; SCL:1; SRVR:MN2PR21MB1151; H:MN2PR21MB1213.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: s8FOEcg43HnJHBuJR0RfMc873Sy9OXn/2gvePZzsyFpotmX1e1FqEDnwjQaJHioSg5O1E8AuzSDH6GZ4OK7LpY7ROlKL6G8ulU0sjdUGnlBCdhtzWWsfDMcjyVFbbLw9inFtDdidVRw+SbL4m24rwtucsMmWd0CZRlVAu03B1L7/6f/TocBv7WjSLt6yLVLvBXBu2zGdiDxFT4oGL98N28KNtKFEVRN3YM9NRLlgaJgCxA1FwHiX3yvjqHwYRidd0ePC9KsUbtYPb26p4cnmmRAizt2Etmlbvr+mOw6pdR1Y7lNiX5jWOD/5y1liPZInq2Tf8VdItZJj0BW+3gKgGriKDh0wj+aM9K4549iTuNYZRZoiIB2Tm6WHXhUllj38sOr5kfIFRntUsCytOxTKAdXrGsyJmGtMb3ZRnomgUbM=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_MN2PR21MB121355B91BC9F6B4DF882CD8FAC70MN2PR21MB1213namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4aba9269-5e23-4123-0792-08d70fbef74f
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jul 2019 22:41:56.1140 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tojens@microsoft.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR21MB1151
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/mhGv67Rg7av5ArleFR1YZqsrPFg>
Subject: Re: [Add] meeting hum: should the IETF take up this work?
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 22:42:02 -0000

> The IETF shouldn't take up work in reaction to non-technical (aka "policy") concerns about imminent deployment of an approved RFC

Those "non-technical" concerns have technical impact, so I fail to see why. DNS server feature discovery protocols, DoH enhancements, and DoH versus DoT preference are all technical topics in the IETF right now that would benefit from the "non-technical" perspective being brought up by many of us.

> Mozilla's presentation accurately stated that DNS is no longer an effective control surface. It can't be, given that HTTPS is ubiquitous, and one can use it to tunnel any protocol.

Michael summarizes my thoughts very well below. To that I'll add: DoH blocks middle boxes from exerting control, but changes nothing about how the RR the stub is reaching out to can exert control. For example, users of Quad9 and CleanBrowsing can use DoH today and are obviously still benefitting from DNS control via content filtering and malware avoidance. Nothing stops app-trusted DoH providers from doing the same thing.

Thanks,
Tommy
________________________________
From: Add <add-bounces@ietf.org> on behalf of Michael Sinatra <michael@brokendns.net>
Sent: Tuesday, July 23, 2019 3:35 PM
To: Rob Sayre <sayrer@gmail.com>; add@ietf.org <add@ietf.org>; Barry Leiba <barryleiba.mailing.lists@gmail.com>
Subject: Re: [Add] meeting hum: should the IETF take up this work?

On 7/23/19 3:09 PM, Rob Sayre wrote:
> Hi,
>
> The IETF shouldn't take up work in reaction to non-technical (aka
> "policy") concerns about imminent deployment of an approved RFC. In this
> case, it's DoH (https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc8484&amp;data=02%7C01%7CJensen.Thomas%40microsoft.com%7C557e447caa8e4c0195c108d70fbe22b1%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636995181625289666&amp;sdata=C13WKC4in7qwck%2BzNF3v3TJMreWx%2BiOAaYqI2KFkAHc%3D&amp;reserved=0).
>
> Mozilla's presentation accurately stated that DNS is no longer an
> effective control surface. It can't be, given that HTTPS is ubiquitous,
> and one can use it to tunnel any protocol.

1. A primary motivation, according to previous discussions on this and
other mailing lists, for DoH is predicated on the *significant
effectiveness* of DNS filtering by oppressive governments.

2. A number of us have pointed out that DNS filtering is commonly used,
also quite effectively, by good guys, and that using DoH by default can
create noticeable collateral damage.

3. You have stated that DNS filter was never that effective, which then
calls into question the primary motivation for DoH.  See #1.

Such an argument--that DNS filtering works for bad uses but doesn't work
for good uses--uncannily mirrors the argument for weakening encryption:
Terrorists won't be able to use encryption, but law-abiding citizens can
still rest assured that online banking and e-commerce will be *just as
secure* as it was before encryption protocols were watered down with
backdoors.

Neither argument holds much water.

michael

--
Add mailing list
Add@ietf.org
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fadd&amp;data=02%7C01%7CJensen.Thomas%40microsoft.com%7C557e447caa8e4c0195c108d70fbe22b1%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636995181625299654&amp;sdata=GvxuxPRLLV8sLJDeGAfEkdzGH7QGGfVnhUVQL2xMnmY%3D&amp;reserved=0