Re: [Add] [EXTERNAL] Re: Browser Administrative Authority

Paul Wouters <paul@nohats.ca> Mon, 27 May 2019 03:44 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E02412022A for <add@ietfa.amsl.com>; Sun, 26 May 2019 20:44:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tJDE9wsf7e9t for <add@ietfa.amsl.com>; Sun, 26 May 2019 20:44:15 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 207F812021F for <add@ietf.org>; Sun, 26 May 2019 20:44:15 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 45C2s84kZtzFNR; Mon, 27 May 2019 05:44:12 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1558928652; bh=FVL/S/dB+nx8gZVew8MA4Z1oDj+3T6aVWL/WdEzvj88=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=DgqytiJDAr4ukICxi0XcbkrEB20E39F6WWzAYcyzVY/M4OPYs8WKRDKCWa4jJP9T8 8E2Do7jR8tRs1AZEMDiO/19Sz6PqIbCfkAa3rNCkp37/y01U3Mwr2A6L2kRDze22jT ralLqDOPGyNtdoEPEfSKpcWH3JQrcRiBjzUIPtPI=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id cf8mu7W8Se4y; Mon, 27 May 2019 05:44:11 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Mon, 27 May 2019 05:44:10 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id 3C1ED500231; Sun, 26 May 2019 20:38:54 -0400 (EDT)
DKIM-Filter: OpenDKIM Filter v2.11.0 bofh.nohats.ca 3C1ED500231
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id 2F25D40BE935; Sun, 26 May 2019 20:38:54 -0400 (EDT)
Date: Sun, 26 May 2019 20:38:54 -0400
From: Paul Wouters <paul@nohats.ca>
To: Melinda Shore <melinda.shore@nomountain.net>
cc: "add@ietf.org" <add@ietf.org>
In-Reply-To: <9ad7aa89-d751-e4c6-dede-e9c22faf6d20@nomountain.net>
Message-ID: <alpine.LRH.2.21.1905262020010.25783@bofh.nohats.ca>
References: <182C9119-59F9-43FA-B116-4D45649B74B5@nbcuni.com> <410f4e4d-aee0-d679-b454-6576de90b21a@nomountain.net> <76EF5603-618C-4A73-A4F9-7489B73B0757@nbcuni.com> <9ad7aa89-d751-e4c6-dede-e9c22faf6d20@nomountain.net>
User-Agent: Alpine 2.21 (LRH 202 2017-01-01)
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/FhcuH1UEvKeV09sRxe-B-OAP1HQ>
Subject: Re: [Add] [EXTERNAL] Re: Browser Administrative Authority
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 03:44:17 -0000

On Sat, 25 May 2019, Melinda Shore wrote:

> But, I think the broader problem is that ISPs are not running
> recursives that use encrypted transport

While from a generic hygiene point of view I agree, but a security point
I don't. People are more in need of protection against DNS manipulation
from their last mile ISP (malicious and "helpful") than from anyone
else. If my local ISP uses encrypted DNS, I still don't trust them. And
the second issue is that ISPs sell DNS query data and other private
information of their customers to third parties and/or their own
affiliates.

As a user I cannot determine that if I once google for "canadian contact
lenses", who and why and where that info went. All I know is that 60%
of ads are suddently about contact lenses across my house, devices and
applications. And the only way out is to encrypt everything end to end,
with no midle man or ISP seeing anything.

> other folks are stepping up/in.  I suppose that in a better
> world an endpoint would be able to check whether or not they
> can protect DNS traffic to the default recursive and, if not,
> fall back to one of {Google, Cloudflare, whomever} but that's
> not where we are right now.

I don't think that solves an interesting problem. At home, systems can
be configured to use a third party DNS (and DoT/DoH helps those IPs to
not get hijacked by their ISP). But for mobile devices, things are much
harder to reconfigure and that's where we need protection the most.
Because there my DNS queries are also getting mapped against my location
data against my own personal privacy interest.

> I do think part of the problem here is that for whatever reason
> our community (the IETF) hasn't come to consensus on problems
> related to trust in the DNS.  If you don't have a trustworthy
> name resolution system you can't trust much else, either.  This
> relates to both being able to get a correct answer that hasn't
> been mucked with by a third party, and to privacy protection
> of queries and responses.

And we are making it worse and worse over time by keeping DNSSEC as an
optional part of DNS, instead of saying that the experiment has been
successful and we are now moving towards phasing out insecure DNS.

>  It seems unsurprising to me that
> browsers (and other application vendors) would respond to the
> default unprotected DNS situation by doing something about it
> themselves.

It wasn't my impression that the deployment of DoT/DoH by browsers was
done primarilly to help the user get a more secure DNS. If that was
the case, tls-dnssec-chains would have zoomed through the WG. Instead,
it seems browser vendors want a more robust and lower latency DNS. A
worthy goal but not a security goal. Also the latency saved will not
give the enduser a faster page, but will be spend extending the ad
auctions to generate more profit of the end users. Bonus points for
encrypting the DNS packets so the competition cannot see them for their
own advertisement and search platforms. Transport security is just a
side effect of all of this.

Paul