Re: [Add] [Doh] Ongoing discussion of DoH, DoT, and related issues

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 10 April 2019 22:55 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B44C1120647 for <add@ietfa.amsl.com>; Wed, 10 Apr 2019 15:55:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vz4xQyBp34bz for <add@ietfa.amsl.com>; Wed, 10 Apr 2019 15:55:55 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78E94120253 for <add@ietf.org>; Wed, 10 Apr 2019 15:55:54 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 5B066BE2F; Wed, 10 Apr 2019 23:55:52 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2oMq6hlcpERB; Wed, 10 Apr 2019 23:55:50 +0100 (IST)
Received: from [10.244.2.138] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 3C9E4BE2E; Wed, 10 Apr 2019 23:55:50 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1554936950; bh=Ljl8K9+V4XkDHzX7a1F4+vuKdO6A6RvFXWpHPuziKGU=; h=To:References:From:Subject:Date:In-Reply-To:From; b=NGkYCDxytV357p+V2kDGI+6hUXZejsZVTLrp82/I1BbGzGfNJJunqZ8OoS+uS4Ahg I5G82vJj5NFpH3rFa3lUwXw7uNJBzq3bs2+iVLK0GFgF0nuIGy+qjs45tsZnFtW9NU 3vlI914+pgVCUXDPssXGDJTzVXuRystr2jIWKxts=
To: Michael Sinatra <michael@brokendns.net>, Ray Bellis <ray@bellis.me.uk>, add@ietf.org
References: <CALaySJKuFYvpM1gt0U_ve-WcjXRVUnDtb=R5gyDDw029D9vGiA@mail.gmail.com> <1c9bafa8-19a0-e14a-c029-3e8b5c8db929@bellis.me.uk> <80a05f5c-c864-934a-2fb7-fa54289dd574@cs.tcd.ie> <ab67053f-1002-b9e5-2bd0-2bb874a143a2@brokendns.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=5BB5A6EA5765D2C5863CAE275AB2FAF17B172BEA; url=
Autocrypt: addr=stephen.farrell@cs.tcd.ie; prefer-encrypt=mutual; keydata= mQINBFo9UDIBEADUH4ZPcUnX5WWRWO4kEkHea5Y5eEvZjSwe/YA+G0nrTuOU9nemCP5PMvmh 5Cg8gBTyWyN4Z2+O25p9Tja5zUb+vPMWYvOtokRrp46yhFZOmiS5b6kTq0IqYzsEv5HI58S+ QtaFq978CRa4xH9Gi9u4yzUmT03QNIGDXE37honcAM4MOEtEgvw4fVhVWJuyy3w//0F2tzKr EMjmL5VGuD/Q9+G/7abuXiYNNd9ZFjv4625AUWwy+pAh4EKzS1FE7BOZp9daMu9MUQmDqtZU bUv0Q+DnQAB/4tNncejJPz0p2z3MWCp5iSwHiQvytYgatMp34a50l6CWqa13n6vY8VcPlIqO Vz+7L+WiVfxLbeVqBwV+4uL9to9zLF9IyUvl94lCxpscR2kgRgpM6A5LylRDkR6E0oudFnJg b097ZaNyuY1ETghVB5Uir1GCYChs8NUNumTHXiOkuzk+Gs4DAHx/a78YxBolKHi+esLH8r2k 4LyM2lp5FmBKjG7cGcpBGmWavACYEa7rwAadg4uBx9SHMV5i33vDXQUZcmW0vslQ2Is02NMK 7uB7E7HlVE1IM1zNkVTYYGkKreU8DVQu8qNOtPVE/CdaCJ/pbXoYeHz2B1Nvbl9tlyWxn5Xi HzFPJleXc0ksb9SkJokAfwTSZzTxeQPER8la5lsEEPbU/cDTcwARAQABtDJTdGVwaGVuIEZh cnJlbGwgKDIwMTcpIDxzdGVwaGVuLmZhcnJlbGxAY3MudGNkLmllPokCQAQTAQgAKgIbAwUJ CZQmAAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAUCWj6jdwIZAQAKCRBasvrxexcr6o7QD/9m x9DPJetmW794RXmNTrbTJ44zc/tJbcLdRBh0KBn9OW/EaAqjDmgNJeCMyJTKr1ywaps8HGUN hLEVkc14NUpgi4/Zkrbi3DmTp25OHj6wXBS5qVMyVynTMEIjOfeFFyxG+48od+Xn7qg6LT7G rHeNf+z/r0v9+8eZ1Ip63kshQDGhhpmRMKu4Ws9ZvTW2ACXkkTFaSGYJj3yIP4R6IgwBYGMz DXFX6nS4LA1s3pcPNxOgrvCyb60AiJZTLcOk/rRrpZtXB1XQc23ZZmrlTkl2HaThL6w3YKdi Ti1NbuMeOxZqtXcUshII45sANm4HuWNTiRh93Bn5bN6ddjgsaXEZBKUBuUaPBl7gQiQJcAlS 3MmGgVS4ZoX8+VaPGpXdQVFyBMRFlOKOC5XJESt7wY0RE2C8PFm+5eywSO/P1fkl9whkMgml 3OEuIQiP2ehRt/HVLMHkoM9CPQ7t6UwdrXrvX+vBZykav8x9U9M6KTgfsXytxUl6Vx5lPMLi 2/Jrsz6Mzh/IVZa3xjhq1OLFSI/tT2ji4FkJDQbO+yYUDhcuqfakDmtWLMxecZsY6O58A/95 8Qni6Xeq+Nh7zJ7wNcQOMoDGj+24di2TX1cKLzdDMWFaWzlNP5dB5VMwS9Wqj1Z6TzKjGjru q8soqohwb2CK9B3wzFg0Bs1iBI+2RuFnxLkCDQRaPVAyARAA+g3R0HzGr/Dl34Y07XqGqzq5 SU0nXIu9u8Ynsxj7gR5qb3HgUWYEWrHW2jHOByXnvkffucf5yzwrsvw8Q8iI8CFHiTYHPpey 4yPVn6R0w/FOMcY70eTIu/k6EEFDlDbs09DtKcrsT9bmN0XoRxITlXwWTufYqUnmS+YkAuk+ TLCtUin7OdaS2uU6Ata3PLQSeM2ZsUQMmYmHPwB9rmf+q2I005AJ9Q1SPQ2KNg/8xOGxo13S VuaSqYRQdpV93RuCOzg4vuXtR+gP0KQrus/P2ZCEPvU9cXF/2MIhXgOz207lv3iE2zGyNXld /n8spvWk+0bH5Zqd9Wcba/rGcBhmX9NKKDARZqjkv/zVEP1X97w1HsNYeUFNcg2lk9zQKb4v l1jx/Uz8ukzH2QNhU4R39dbF/4AwWuSVkGW6bTxHJqGs6YimbfdQqxTzmqFwz3JP0OtXX5q/ 6D4pHwcmJwEiDNzsBLl6skPSQ0Xyq3pua/qAP8MVm+YxCxJQITqZ8qjDLzoe7s9X6FLLC/DA L9kxl5saVSfDbuI3usH/emdtn0NA9/M7nfgih92zD92sl1yQXHT6BDa8xW1j+RU4P+E0wyd7 zgB2UeYgrp2IIcfG+xX2uFG5MJQ/nYfBoiALb0+dQHNHDtFnNGY3Oe8z1M9c5aDG3/s29QbJ +w7hEKKo9YMAEQEAAYkCJQQYAQgADwUCWj1QMgIbDAUJCZQmAAAKCRBasvrxexcr6qwvD/9b Rek3kfN8Q+jGrKl8qwY8HC5s4mhdDJZI/JP2FImf5J2+d5/e8UJ4fcsT79E0/FqX3Z9wZr6h sofPqLh1/YzDsYkZDHTYSGrlWGP/I5kXwUmFnBZHzM3WGrL3S7ZmCYMdudhykxXXjq7M6Do1 oxM8JofrXGtwBTLv5wfvvygJouVCVe87Ge7mCeY5vey1eUi4zSSF1zPpR6gg64w2g4TXM5qt SwkZVOv1g475LsGlYWRuJV8TA67yp1zJI7HkNqCo8KyHX0DPOh9c+Sd9ZX4aqKfqH9HIpnCL AYEgj7vofeix7gM3kQQmwynqq32bQGQBrKJEYp2vfeO30VsVx4dzuuiC5lyjUccVmw5D72J0 FlGrfEm0kw6D1qwyBg0SAMqamKN6XDdjhNAtXIaoA2UMZK/vZGGUKbqTgDdk0fnzOyb2zvXK CiPFKqIPAqKaDHg0JHdGI3KpQdRNLLzgx083EqEc6IAwWA6jSz+6lZDV6XDgF0lYqAYIkg3+ 6OUXUv6plMlwSHquiOc/MQXHfgUP5//Ra5JuiuyCj954FD+MBKIj8eWROfnzyEnBplVHGSDI ZLzL3pvV14dcsoajdeIH45i8DxnVm64BvEFHtLNlnliMrLOrk4shfmWyUqNlzilXN2BTFVFH 4MrnagFdcFnWYp1JPh96ZKjiqBwMv/H0kw==
Message-ID: <beba568f-c07f-3442-cd5d-8a74c1e149f1@cs.tcd.ie>
Date: Wed, 10 Apr 2019 23:55:49 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <ab67053f-1002-b9e5-2bd0-2bb874a143a2@brokendns.net>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="Zt3qtDl4d03qTHpnHvuoMJbLCoXauc0WI"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/PU7lfwqRsjJVLa7w-pRRe7ZSUeo>
Subject: Re: [Add] [Doh] Ongoing discussion of DoH, DoT, and related issues
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Apr 2019 22:55:59 -0000

Hiya,

On 10/04/2019 23:29, Michael Sinatra wrote:
> 
> 
> On 2019-04-10 13:50, Stephen Farrell wrote:
> 
>>> This whole mess started, IMHO, because some parties are treating the DNS
>>> as an application service, and not as part of the infrastructure and
>>> network services.
>>
>> I don't think that's accurate. My take is that DNS privacy work
>> started for perfectly valid privacy reasons and that DoT (while
>> a fine thing) wasn't the right tool for some who need that better
>> privacy... hence DoH.
> 
> I realize you realize that begs the following question... :-)
> 
> What's "better" about the privacy afforded by DoH? 

Eh.. that was in the paragraph from which you quoted above... in
the bit you didn't quote;-)

Basically, if the application wants to know that DNS privacy
is being applied, it has to do it itself. (There are other
arguments, and I'm not a browser-maker so they may have other
reasons they think more important.)

> If applications
> choose which DNS server to use without the informed consent of the user

I've already disputed the possibility of informed consent here.
(And will do again below:-)

> or in ways that obfuscate the DNS transaction and undermine the user's
> control, that potentially _erodes_ privacy.  If DoH encourages network
> administrators in certain regulatory (imagined or real) domains to do
> inline TLS decryption, that potentially _erodes_ the user's privacy.

Yes, if people bugger about MitM'ing TLS, that harms us all.

Every time we see an interesting uptick in use of TLS in any
sphere, we see claims that we'll be overwhelmed by MitMs to
defeat that and arguments that the putative potential fault
for that lies with whomever is causing the uptick. The fact
that that keeps happening seems to be evidence that uses of
TLS between intended endpoints are not being overwhelmed in
that way. That's a good thing IMO even if there are a few
more MitM attack boxes deployed than previously when pretty
much everything was in clear and utterly vulnerable.

In the current discussion, if you do control the client endpoint,
then manage that well and you'll have no need to bugger with TLS
at all. If you do not control the endpoint (or are inept in
doing so) then I'd be interested in how you propose to go about
MitM'ing TLS.

> 
> IMO, this mess started for two reasons:
> 
> First, DoH advocates internalized 

Your or my guesses as to who internalised what seem unlikely to
be a useful part of the discussion. (You'll note I framed my
explanation in terms of what's visible-to/controllable-by different
bits of s/w running on a machine, and not in terms of people's
motivations, which I think ought not be a topic for discussion
here.)

> a particular definition of privacy and
> made the assumption that DoH maximized privacy according to that
> definition, within the constraints of a particular set of use-cases.
> Based on the debate in these forums, it doesn't feel like DoH advocates
> considered the full range of use-cases, and how different sets of users
> define "privacy."
> 
> Second, applications developers like Mozilla made the assumption that
> their vetting of DNS providers was sufficient to justify announcing
> their intent to use said providers by default, rather than leaving that
> decision as a user opt-in.  (And the announcement of intent was enough
> to create this mess, even if they didn't or won't follow-through.)
> 
> It's perfectly reasonable to say that DoH improves certain aspects of
> privacy under certain use-cases.  It's also reasonable to recognize, and
> appropriately disclaim, that there are use-cases and circumstances where
> DoH can undermine privacy.  This is why I believe we need to continue
> work on draft-reid-doh-operator-00,
> draft-livingood-doh-implementation-risks-issues-03, and
> draft-bertola-bcp-doh-clients-00.
> 
>>> Having individual applications do that without the informed consent of
>>> their users is over-reach, IMHO, whatever their lawyers write into their
>>> shrink-wrap licenses.
>>
>> Partly agree. I hate the license-crap the s/w business involves so
>> agree with you there. OTOH, I disagree that informed consent is at
>> all feasible here - we simply cannot expect a typical user to spend
>> literally hours of work needed to really understand the issues here.
> 
> I think your definition of "typical user" is unduly narrow.  Regardless,
> DoH doesn't absolve the user from understanding the issues at hand.  It
> simply migrates the management of a component of the user's personal
> information from "network" to "application," potentially without
> informing the user or letting them opt-in.  IMO the IETF can and should
> take a stand that this is not the desired BCP for DoH.
> 
>> And without understanding there can be no informed consent, except
>> perhaps in some weasel-wordy manner. IOW, I think arguments about
>> consent here are about as convincing as asking that people look up
>> BGP information before allowing their packets be routed.
> 
> I think your analogy is wide of the mark. 

My argument was not an analogy.

To re-iterate:

"without understanding there can be no informed consent"

is the core of my argument on this part of the discussion. I'm
quite happy to defend that proposition (which is not an analogy).

Cheers,
S

> The correct analogy would be
> having users select network providers on the basis of their privacy
> policies and their routing hygiene (prefix filtering, MANRS-compliance,
> origin-validation practices, etc.).  You might say, "but not all users
> do that!" and you would certainly be right.  But some do take those
> factors into consideration (or they ask knowledgeable folks to make
> informed recommendations) and they should be given the necessary
> information to make an informed decision.  And the IETF *can* influence
> this through BCPs.
> 
> michael
>