Re: [Add] [EXTERNAL] Re: Browser Administrative Authority

Erik Kline <ek@loon.com> Sat, 25 May 2019 19:27 UTC

Return-Path: <ek@google.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7EB2120103 for <add@ietfa.amsl.com>; Sat, 25 May 2019 12:27:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.499
X-Spam-Level:
X-Spam-Status: No, score=-9.499 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=loon.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eIGDIygYZBZS for <add@ietfa.amsl.com>; Sat, 25 May 2019 12:27:34 -0700 (PDT)
Received: from mail-it1-x131.google.com (mail-it1-x131.google.com [IPv6:2607:f8b0:4864:20::131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E64B7120021 for <add@ietf.org>; Sat, 25 May 2019 12:27:33 -0700 (PDT)
Received: by mail-it1-x131.google.com with SMTP id g24so14160449iti.5 for <add@ietf.org>; Sat, 25 May 2019 12:27:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=loon.com; s=google; h=mime-version:references:in-reply-to:reply-to:from:date:message-id :subject:to:cc; bh=U648wdRV5QWktMr1pOwhu9QVVw3iP8OLOtwnQetElso=; b=ARokvejnDquCuzvwilkmStl8Wi7dPsrOxOmfD5ukel4cJb3KmhPZjikwxKpk4I7sk/ I4QBu/MIIhfqt4BCuqPbM1iy/LsAzpCF8RzuDGatz/EcQh62P1vYaV7vmUFwtzTDfDKp KU+woZSKtIBdLwnSsefgSlegbx7CFM+EYoslc=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:reply-to :from:date:message-id:subject:to:cc; bh=U648wdRV5QWktMr1pOwhu9QVVw3iP8OLOtwnQetElso=; b=L66sVH1uw9A4epx7ZTAOq9TwTT9Nl0hw+6fS2844HEJh+4TR+bJTF0Mc4WF1JQoJ5d W1pq7oje6wkPmfpDtH3+y9ioRZ2Q0QUZ3jvzrbD2eX8AZBTe32r0n3QMOgOxod46Pqkv yRW46KaiXQdBMlFP/oIqy/T5NU1LdxD/5FmSLUMtHSxYFO/tHZJpbL7B+C1LejnWvera yN6fbX5RH1u4YWnt14g6Xg3nn7iqtCrt2qjWzKmC6/NvcY46yJBz4rJ2lFvr93zkGR8L xIz5yByhhQA6pp3JF/VXDfEoFKiqiPrIvajgKo8xkgu1QxVYSma1IipKn+HeCp8Yagcu oR7w==
X-Gm-Message-State: APjAAAUQDY1HfoY01UbU5KGJbKYJB45seT7mHpKK3ebtqphBKTEsxLYr Q6sqDkhPlzCUCDRKxeaQNZ8ZnicTNHXW/5sAmiWTQQ==
X-Google-Smtp-Source: APXvYqxJpeehRCqid/rLJ36Vxq7ECXrDS7FwYlQJy/XS37oIuzNAXN0ZO7gSDWIupnOCqjygvznVAZCXbdWXd1RhIKI=
X-Received: by 2002:a24:7bcc:: with SMTP id q195mr22039073itc.73.1558812452980; Sat, 25 May 2019 12:27:32 -0700 (PDT)
MIME-Version: 1.0
References: <182C9119-59F9-43FA-B116-4D45649B74B5@nbcuni.com> <410f4e4d-aee0-d679-b454-6576de90b21a@nomountain.net> <76EF5603-618C-4A73-A4F9-7489B73B0757@nbcuni.com> <9ad7aa89-d751-e4c6-dede-e9c22faf6d20@nomountain.net>
In-Reply-To: <9ad7aa89-d751-e4c6-dede-e9c22faf6d20@nomountain.net>
Reply-To: ek@loon.com
From: Erik Kline <ek@loon.com>
Date: Sat, 25 May 2019 12:27:20 -0700
Message-ID: <CAAedzxrxChBwtv=rAcx=XcJ_K0HRsfwv6TNFynJxNRPZkG_GKA@mail.gmail.com>
To: Melinda Shore <melinda.shore@nomountain.net>
Cc: "Deen, Glenn (NBCUniversal)" <Glenn.Deen@nbcuni.com>, "add@ietf.org" <add@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008872450589bb4e90"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/UcYGNkqCb8S0oHV6yIuUjnMnbxU>
Subject: Re: [Add] [EXTERNAL] Re: Browser Administrative Authority
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 19:27:36 -0000

>
>
> It's certainly the case that some applications that run in
> browsers have narrower security requirements around DNS
> than others do, and right now there's no way for those
> applications to discover whether or not their DNS queries
> are protected.
>
>
FWIW, we did try to address this in Android's DoT implementation with
LinkProperties#getPrivateDnsServerName()
<https://developer.android.com/reference/android/net/LinkProperties#getPrivateDnsServerName()>
 and LinkProperties.html#isPrivateDnsActive()
<https://developer.android.com/reference/android/net/LinkProperties.html#isPrivateDnsActive()>.
But that's just the one platform.