Re: [Add] publication of DoH Resolver policies

tirumal reddy <kondtir@gmail.com> Mon, 27 May 2019 13:12 UTC

Return-Path: <kondtir@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60F59120141 for <add@ietfa.amsl.com>; Mon, 27 May 2019 06:12:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HNR6ufeUBVg8 for <add@ietfa.amsl.com>; Mon, 27 May 2019 06:12:13 -0700 (PDT)
Received: from mail-it1-x136.google.com (mail-it1-x136.google.com [IPv6:2607:f8b0:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A63612004B for <add@ietf.org>; Mon, 27 May 2019 06:12:13 -0700 (PDT)
Received: by mail-it1-x136.google.com with SMTP id g23so17342571iti.1 for <add@ietf.org>; Mon, 27 May 2019 06:12:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+Yb6XmckxyLhf9UzllI2/Rxvei+DE8DrNfQU2hh4g9k=; b=avb5HJ7//wX8sniCwiVeQDnTZACvBSSuYh5qT03VpCd6keThkHbXzrYxFgSWDPpk3H HrZKsUOzUE2Yfq5ssTV36Zi0KVUWCGfBZXvdLC+ESQsf27+G+RcEQnGqM5TzIRFfQFwh kBwR/UckEd2CCcYAuswt+pB2xgHAySD88Wc4eYYXjdGx52HMJJ22zbBF2HY1CIYzE3vy FFQdSqiXAYJx0ZgCI7wN/qHtGFwJwtRkWo/a+Z2DaoSIXQ6o3bQ7ADcFkfd5q2NfBY+E ECUvw535XuhlyYyUzzlcVVFohC+Ej9amba5/OaHhkYhNtZAfXp3LqM1iGN/jmMiSxO9W IJ/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+Yb6XmckxyLhf9UzllI2/Rxvei+DE8DrNfQU2hh4g9k=; b=oFsta094b3TvOkVGgrbMcLK6dc7Yg7rbLDOBd9MaU1Kns/fSyE+EdyBsDAlBqNFxX4 Od9rHmEjdyzTVAoqOnlV0oM7m19D9Yi6hjsZWAwocl60ilhAl+Q4cegPsXbjKU7VpQCr 3LnRBvkXDM/1Ig/pTCvepZpaSe7RmYU/QHH6cubX2xL5jves71yedbUThZmRMe50cFnM QjfKoQrwI9luim/E7zP0Btdth16xcM2lsI5WCN2WCj3oE4eJXAyTdadAG48JTLefXjuQ 2rh9aNsWQg4knDcajxGrUE/+oJ8RLBggwmf0y4Szk+vWMI9wu3I+HW82ewPxm4J9t3M6 1FOg==
X-Gm-Message-State: APjAAAW723+awnIhMmObQ9hALwhvG7zbGQJR38VbyjKgXk447M4uYrxO FRbleYuuagP3vRmHUpvPfXHwOmsOqn1DoTG3VMt93n+quP4=
X-Google-Smtp-Source: APXvYqzx9jW8ud8u3mm+lExzLTGsqWnme25wFinAOrFiyTBMiqLqMB7TNTau6soWCmgln5UhlgKkua+aODfZT8aMyio=
X-Received: by 2002:a24:798a:: with SMTP id z132mr27294999itc.101.1558962732840; Mon, 27 May 2019 06:12:12 -0700 (PDT)
MIME-Version: 1.0
References: <182C9119-59F9-43FA-B116-4D45649B74B5@nbcuni.com> <410f4e4d-aee0-d679-b454-6576de90b21a@nomountain.net> <76EF5603-618C-4A73-A4F9-7489B73B0757@nbcuni.com> <9ad7aa89-d751-e4c6-dede-e9c22faf6d20@nomountain.net> <525969024.22086.1558949269703@appsuite-gw1.open-xchange.com> <CAFpG3gdGpD+jpdChk4zeee+2Mh13mFuPK8kLxmx8DrRZYdy6pw@mail.gmail.com> <11C1E629-A2AE-468E-99B3-C2BBF9E4AE7C@rfc1035.com>
In-Reply-To: <11C1E629-A2AE-468E-99B3-C2BBF9E4AE7C@rfc1035.com>
From: tirumal reddy <kondtir@gmail.com>
Date: Mon, 27 May 2019 18:42:01 +0530
Message-ID: <CAFpG3gdwBHoED-TXL3_2ksx-DPd7oRtaUD-FYyfz8yYvdw_Z8A@mail.gmail.com>
To: Jim Reid <jim@rfc1035.com>
Cc: ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000e8bad60589de4bc0"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/EgU6s4cM1jC7M6yJ8-XBQGOf_LE>
Subject: Re: [Add] publication of DoH Resolver policies
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 13:12:16 -0000

On Mon, 27 May 2019 at 16:53, Jim Reid <jim@rfc1035.com> wrote:

> On 27 May 2019, at 11:59, tirumal reddy <kondtir@gmail.com> wrote:
> >
> > If the DOH server provided by the network offers the same level of
> privacy preserving data policy as the DOH server pre-configured in the
> browser, Why shouldn't the browser use the network provided DOH server ?
>
> How could the browser tell that both DoH servers have the same policy?
>

> How does the browser (or anything else for that matter) know what some
> arbitrary DoH server’s privacy preserving data policy is? Where will this
> be documented and published in a way that a web-based application or the
> end user can understand and then make an informed choice?
>

https://tools.ietf.org/html/draft-reddy-dprive-bootstrap-dns-server-03#section-10
defines a new privacy certificate extension that identifies the privacy
preserving data policy of the DNS server, it is in a machine-parsable
format.


>
> Now rinse and repeat that for other server-side policies: data retention,
> GDPR compliance, DNS filtering/blocking, TLS session resumption, ECS
> behaviour, QNAME minimisation, NXDOMAIN rewriting, query-related adware,
> etc, etc.
>
> Oh, and if some DoH server says “I do QNAME minimisation” (say), does the
> browser or end user simply take that on trust or would they somehow be
> expected to verify that for themselves?
>

End user typically does not trust DOH server in a untrusted network (e.g.
public WiFi network) and may only use the DOH server provided by trusted
network (e.g. Enterprise, Secure home networks), similar to the way users
disable VPN connection in specific networks and enable VPN connection by
default in other networks for privacy. In addition, the privacy extension
includes a URL that points to the security assessment report of the DNS
server by a third party auditor.

Cheers,
-Tiru