Re: [Add] [EXTERNAL] Re: ADD Requirements Draft

Tommy Jensen <Jensen.Thomas@microsoft.com> Tue, 01 September 2020 17:11 UTC

Return-Path: <Jensen.Thomas@microsoft.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1C34E3A0B64 for <add@ietfa.amsl.com>; Tue, 1 Sep 2020 10:11:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oSP5RfGA2HBl for <add@ietfa.amsl.com>; Tue, 1 Sep 2020 10:11:27 -0700 (PDT)
Received: from NAM06-DM3-obe.outbound.protection.outlook.com (mail-eopbgr640132.outbound.protection.outlook.com [40.107.64.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CBC773A0B5B for <add@ietf.org>; Tue, 1 Sep 2020 10:11:27 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DuaGOWKTqmQsXzt0dgJ/J9hPKR58mrex47CHXJPIJ3Is/VNn8s5u+oVjaFnqovDv13rGsdHfs6C6LfSU2mkYoDlXlmaZ8tazi/zRYb6NFpvjcZDyv4y/YXdtQShu5EpAh2BnP5llgG9FR0sTJAHZrF1OBckgnI501bzaYgJKacH5chGBsovXbY2T6rqlzR3JOoW1nBbk1H2qBTwb0otiWTutpHnaTpq3aCf5jvRiTz03dJoCI9siwdm1IhlDY43+Iid6bG749/idVVJwkJI4T7ZimmilNGFD8aBIiPP1LZ16HbaF/GCxravSIB3Tbd9DAbZ8JoXcdTWweXnaOHbbmg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y2cgBu6Qju1r+hNJ3C2ydIteVDmiCy4p2y8CGMRYao4=; b=WSaBkYSgfcyweQL21RENWb0xLDnr2UIgKRkEUzlL82yaFM6+I051Woy1Gea8Ort1+qvlWdQe0kPSsy0S/iN6Z534v0+tR2QS8cXNHa0u+GYiJ53WhZ3SII8r8H6kjqzHEIlZhCB7J3ufvcIwvrI592jg37EdaZP9XNa+erOW0i9jfmFiV+EHEYL21enUsbdER+QbPBcOTmKqF8TGqOC74mHvkZkSxlOOjV1RaBkS9jDOSPDU8axQjgpc62t6cAwOtp2U5Bqsc4BPSPDWBLOd6XfgD6wtLuUs3j/22iZaalNPAGgR22yVi1XgXzyYDWVcXHAE4e/SGpoeL3ZTSkCPcA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=y2cgBu6Qju1r+hNJ3C2ydIteVDmiCy4p2y8CGMRYao4=; b=AKzJlJ8D2Hym5xceJqhwxjolNYXFCTpYjb21TWlnVfbLjTUI8e/QuFGHpo8JjQg5gaAskWL8y2F+hbVpfewsGDbU2kPZGCpeE3qJHFZNEo0PB8xYiwdqzR+HkErnZH3pV0WjxWj3cbVdyrXbcv6LHMwycW/lUK4+1Cc0fBIvSdQ=
Received: from (2603:10b6:5:1bd::10) by DM6PR00MB0572.namprd00.prod.outlook.com (2603:10b6:5:16c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3379.0; Tue, 1 Sep 2020 17:11:25 +0000
Received: from DM6PR00MB0783.namprd00.prod.outlook.com ([fe80::755a:3403:7e20:fbe8]) by DM6PR00MB0783.namprd00.prod.outlook.com ([fe80::755a:3403:7e20:fbe8%5]) with mapi id 15.20.3385.000; Tue, 1 Sep 2020 17:11:25 +0000
From: Tommy Jensen <Jensen.Thomas@microsoft.com>
To: Eric Rescorla <ekr@rtfm.com>, tirumal reddy <kondtir@gmail.com>
CC: ADD Mailing list <add@ietf.org>, Christopher Wood <caw@heapingbits.net>
Thread-Topic: [EXTERNAL] Re: [Add] ADD Requirements Draft
Thread-Index: AQHWeMhRVA76juaZAkWbbFZTQ7rlQqlI7A4AgAFEfACAABOQgIABLEuAgACGa4CAATMngIAAZW0AgAYgDoCAAF3TAIAABL1O
Date: Tue, 01 Sep 2020 17:11:25 +0000
Message-ID: <DM6PR00MB0783D4A658BE3BA8EBD6533BFA2E1@DM6PR00MB0783.namprd00.prod.outlook.com>
References: <31194C90-6C0B-470C-8B14-79C12D2C5C0D@comcast.com> <CACJ6M14gXmEHc_fX8=GpKwRDn6C=R7LR06JG_Qg-cWR5agU9Hw@mail.gmail.com> <391E15D2-9208-4BA9-B01E-3673982DA6CE@apple.com> <CABcZeBMXvcF6PJWE+EkGVx1c9RXzO1XuB3xhrVKUJvUb=aus8A@mail.gmail.com> <4cd8a8c6-3516-4ad6-877c-9460d8096773@www.fastmail.com> <CAFpG3gfkrKGiuPRH1QvH+-w2H=N1ijtDpk5Oh=D2JOp-L4Q1+w@mail.gmail.com> <CABcZeBNhHcNAkVm=PNUvV8_vGVvDvJbaMVHB_w9zu63+ebQwpQ@mail.gmail.com> <CAFpG3gcAjHkh7boDwLq+sHpGtfB2WT0NbuuFqqBQs2M6BZkAOQ@mail.gmail.com> <CABcZeBMi-B7LKB6ipt6vLSZcF9OMLga8f+qydpZVOhOGQrttuQ@mail.gmail.com> <CAFpG3geQefT0=fN-6UFwDqLLqbb1XthHA=np4HPS2NfSO77csA@mail.gmail.com> <CABcZeBPmfe8Um38xFHoxw+26-YQxFUPN+p4aW9uzbPKGy1xz4g@mail.gmail.com> <CAFpG3gefyTcibzfQ-dzXKv5fKE=vwUktux0dz25wNL7_+tf7MA@mail.gmail.com>, <CABcZeBMVcH74RYXZrLRNtHLi-xZgGxRHA2CsH6nbiz+5uGM32g@mail.gmail.com>
In-Reply-To: <CABcZeBMVcH74RYXZrLRNtHLi-xZgGxRHA2CsH6nbiz+5uGM32g@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-09-01T17:11:25.220Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard;
authentication-results: rtfm.com; dkim=none (message not signed) header.d=none;rtfm.com; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [50.35.64.46]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 29359701-721b-4fdc-774f-08d84e9a0f13
x-ms-traffictypediagnostic: DM6PR00MB0572:
x-microsoft-antispam-prvs: <DM6PR00MB05728061206525362A75D0EDFA2E1@DM6PR00MB0572.namprd00.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: /aQAIkfwoUCqiitAsElIXUDRCPP3PCZWWZZO41vicvSxACTCIZ3dfDNsA2SU4eQ+qVaIM/Ir/O2ItNUmFBEOi0L03UlhGXx95991al1kj8FBMDghBiKPDVdlyI9HQ89Pgo59Hz4eHNFEnPGfj6WUzdFd0l9tJHZODk2FwzcAoX65m3m/jdtwXWV9unMftKjVjBMd9DTKfsGh5CysMpe7tvm1Q1svUv029Szw6Vx6UbPcUHxU73NC78KkJ98qGjyDbkonrEtxf58b9CcLxF/nuh7Q5SMvQNXV70AzLEmwHAIyDtV78NzKPlQs+yqykNaImryGIeMoIn2ub9shSqg/8+tDpmQO9RD76cgbyNaqnRMrqnumWdXurmM0V/0GbG6UrsMLP2PMdI28ByitBxRLJg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR00MB0783.namprd00.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(396003)(39860400002)(136003)(366004)(52536014)(53546011)(7696005)(76116006)(4326008)(91956017)(54906003)(110136005)(5660300002)(316002)(966005)(6506007)(71200400001)(478600001)(2906002)(186003)(55016002)(66946007)(8990500004)(83380400001)(66476007)(33656002)(166002)(82950400001)(64756008)(66556008)(86362001)(26005)(19627405001)(10290500003)(8936002)(9686003)(82960400001)(66446008)(8676002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_DM6PR00MB0783D4A658BE3BA8EBD6533BFA2E1DM6PR00MB0783namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR00MB0783.namprd00.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 29359701-721b-4fdc-774f-08d84e9a0f13
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Sep 2020 17:11:25.6315 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: XvBDHn2ztIGidOm1xbtx4NqTS/IkKb3rYLalzgjakm0XhT5XHDmU5EIZIhbHzH0GkbCFfxKkBaANr7qINZmLWg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR00MB0572
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/_3tlVZBRjRSqqL8dlM9WSZodz6s>
Subject: Re: [Add] [EXTERNAL] Re: ADD Requirements Draft
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Sep 2020 17:11:30 -0000

ekr> Taking a step back here: is there any client with significant usage that would be interested in consuming this kind of policy when published by a resolver?

Speaking for myself: no. The user either understands the implications and has pre-configured a resolver of their choice, or they don't and expect DNS to just work. Until DNS server choice is an everyday user concept akin to music streaming app choice (or at least wireless network choice), that will continue to be the case.

Thanks,
Tommy

________________________________
From: Add <add-bounces@ietf.org> on behalf of Eric Rescorla <ekr@rtfm.com>
Sent: Tuesday, September 1, 2020 9:46 AM
To: tirumal reddy <kondtir@gmail.com>
Cc: ADD Mailing list <add@ietf.org>; Christopher Wood <caw@heapingbits.net>
Subject: [EXTERNAL] Re: [Add] ADD Requirements Draft



On Tue, Sep 1, 2020 at 4:10 AM tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> wrote:
Hi Eric,

Please see inline

On Fri, 28 Aug 2020 at 19:08, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote:


On Fri, Aug 28, 2020 at 12:35 AM tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> wrote:
On Thu, 27 Aug 2020 at 18:46, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote:


On Wed, Aug 26, 2020 at 10:15 PM tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>> wrote:
Hi Eric,

Please see inline

On Wed, 26 Aug 2020 at 16:50, Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>> wrote:


As I said when you first proposed this in an ADD meeting, I do not believe that anything of this kind is viable.

1. Certificates tied to a legal entity have not been effective, which is why browsers are removing EV.

The draft does not propose using EV certificates for encrypted DNS servers, please see https://tools.ietf.org/html/draft-reddy-add-server-policy-selection-05#section-4<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-reddy-add-server-policy-selection-05%23section-4&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C4f39107a43f8461cc8c808d84e96ac6c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345757215760305&sdata=zwTj9VSEumHDnBDlWRQySYQf2lljLOE7aG%2FcNJKWx%2Bk%3D&reserved=0> for more details.

It proposes something similar, which I expect to have the same drawbacks.


2. There is ample evidence that users do not read privacy policies.

The DNS server privacy statement is much more simpler compared to a typical privacy statement by a
content service provider (see https://tools.ietf.org/html/draft-ietf-dprive-bcp-op-14#section-6<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-ietf-dprive-bcp-op-14%23section-6&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C4f39107a43f8461cc8c808d84e96ac6c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345757215770297&sdata=Aon0Ne%2FXFeIqNAPGMS5g0t%2FpPaqrg9bs3OTDJzK3wn8%3D&reserved=0>).

I don't think that makes it significantly more likely that people will read it.


Further, automated analysis of a privacy statement is possible using deep learning (https://pribot.org/files/Polisis_USENIX_Security_Paper.pdf<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpribot.org%2Ffiles%2FPolisis_USENIX_Security_Paper.pdf&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C4f39107a43f8461cc8c808d84e96ac6c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345757215770297&sdata=btIZBlgmsG2b9zCE6pSjQt7q%2FteV6HVT8fakqd08sWQ%3D&reserved=0>). You can explore polisis and pritbot at https://pribot.org<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpribot.org%2F&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C4f39107a43f8461cc8c808d84e96ac6c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345757215780290&sdata=DluH1rTl9DL%2Blcmt0nb5jhy9H6i1QyJwGJhBkT3x%2FoM%3D&reserved=0> to explore the analysis of privacy statements by several organizations..

I took a quick look at this tool and while it appears to be interesting work, it does not produce output which I think is likely for users to actually assimilate. For instance here is what it does with McAfee's policy:
https://pribot.org/polisis/?company_url=mcafee.com&_id=59d8f9c4e3dd0c4e24555c1d&category=first-party-collection-use<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fpribot.org%2Fpolisis%2F%3Fcompany_url%3Dmcafee.com%26_id%3D59d8f9c4e3dd0c4e24555c1d%26category%3Dfirst-party-collection-use&data=02%7C01%7CJensen.Thomas%40microsoft.com%7C4f39107a43f8461cc8c808d84e96ac6c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637345757215780290&sdata=gL%2BUOJ3dykOrd316WbZH5HpswalaWAKHscWQspcHM7w%3D&reserved=0>

We've already run this experiment of machine readable privacy policies once with P3P and I don't see a reason to think this will be any different

Taking a step back here: is there any client with significant usage that would be interested in consuming this kind of policy when published by a resolver? If so, I'd like to hear from them about their needs. If not, it doesn't seem worth discussing further.

-Ekr