Re: [Add] ADD Requirements Draft

tirumal reddy <kondtir@gmail.com> Wed, 02 September 2020 12:32 UTC

Return-Path: <kondtir@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A46743A0D70 for <add@ietfa.amsl.com>; Wed, 2 Sep 2020 05:32:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JnIzIO6bVBL5 for <add@ietfa.amsl.com>; Wed, 2 Sep 2020 05:32:11 -0700 (PDT)
Received: from mail-il1-x130.google.com (mail-il1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABC683A0D85 for <add@ietf.org>; Wed, 2 Sep 2020 05:32:11 -0700 (PDT)
Received: by mail-il1-x130.google.com with SMTP id x2so4799277ilm.0 for <add@ietf.org>; Wed, 02 Sep 2020 05:32:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Oh7haUo6RAIYt19DVNpR2mzwxrejvN+qOwNfLKpZkiU=; b=Jr/Ij00zPM4TRJfcW0nA7TLQWij60KzhE8myiFOGuafN1r/gzVWv2qpRsORAbOmquo TEIfd4O9SL9tC+kQdGZeyqkYvP3CW9vWp3dsPI22UJm/aPqcHvfeC+5+Qgg8n6QFW9Tk hqeqsDrPnbWNacxRa0+5KTEnSaxYgL2mAPnsYp4tu2D3UhcHsC8ECa0keG6KjJFxv3iE BJibNR7RhELNfc8LElpbzfpkyM5sqbp4tF/aKz+o+PLwRKhyUFPA8hFGFDdcYRZiRqTZ 0hQFOD8T52kbvdL7Cp44mUnli2FTniVqQZ+KKan8Aa1DO1AqFqtsncMa5H//ML7hj1Sf Lg1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Oh7haUo6RAIYt19DVNpR2mzwxrejvN+qOwNfLKpZkiU=; b=oYiR13PQ4MHYvd0gyyEwPtG00hNcB19hbp7ngai8yLQ8vXP+GXJen8moQGdJdKE3/t pg2BjFrT3S72NcWo3pm6M9FWvdGCOyxgjBikzQmlE0GRd7t54OEz6/nWKvRtQ+5sfHee MylDPTW9n1okjSdiDUITQA+Ws34KN2mPQCMXcR4LPaZXkrTJAKf9h87LTpzzRNmWLiHT lbPaHyGf0Wc9QIOW939V+BDNRVNDC6iOKM69VRzC+yqarwA7cu8JwW6YFCwG3RbwgF0d S+bcZ6O5Or2nRhGBf217FenUBsHkDwuIfU4bSvtl3ndFkl+VgvpE9NIBzjbSDRwEMDre 5WSw==
X-Gm-Message-State: AOAM533vjOtFXqsvPjiKt8f2WYad94ZdIkpJhTX6iNt2slRDqG/Xrb2E t1P9p08ZP4jO4SVVYjDV/KcF2O4u4WnSqsvsAvEu0P2diAsEkQ==
X-Google-Smtp-Source: ABdhPJzqE8/OTjUIR1WSUehbOFVSeHlpL/Wlf6siOjovW5yP3VKLiLfpI0xHxtsfe/vkQXTjOGMKMpFkWl7Ng1mFUNw=
X-Received: by 2002:a92:c205:: with SMTP id j5mr3557383ilo.300.1599049930741; Wed, 02 Sep 2020 05:32:10 -0700 (PDT)
MIME-Version: 1.0
References: <31194C90-6C0B-470C-8B14-79C12D2C5C0D@comcast.com> <CACJ6M14gXmEHc_fX8=GpKwRDn6C=R7LR06JG_Qg-cWR5agU9Hw@mail.gmail.com> <391E15D2-9208-4BA9-B01E-3673982DA6CE@apple.com> <CABcZeBMXvcF6PJWE+EkGVx1c9RXzO1XuB3xhrVKUJvUb=aus8A@mail.gmail.com> <4cd8a8c6-3516-4ad6-877c-9460d8096773@www.fastmail.com> <CAFpG3gfkrKGiuPRH1QvH+-w2H=N1ijtDpk5Oh=D2JOp-L4Q1+w@mail.gmail.com> <CABcZeBNhHcNAkVm=PNUvV8_vGVvDvJbaMVHB_w9zu63+ebQwpQ@mail.gmail.com> <CAFpG3gcAjHkh7boDwLq+sHpGtfB2WT0NbuuFqqBQs2M6BZkAOQ@mail.gmail.com> <CABcZeBMi-B7LKB6ipt6vLSZcF9OMLga8f+qydpZVOhOGQrttuQ@mail.gmail.com> <CAFpG3geQefT0=fN-6UFwDqLLqbb1XthHA=np4HPS2NfSO77csA@mail.gmail.com> <CABcZeBPmfe8Um38xFHoxw+26-YQxFUPN+p4aW9uzbPKGy1xz4g@mail.gmail.com> <CAFpG3gefyTcibzfQ-dzXKv5fKE=vwUktux0dz25wNL7_+tf7MA@mail.gmail.com> <CABcZeBMVcH74RYXZrLRNtHLi-xZgGxRHA2CsH6nbiz+5uGM32g@mail.gmail.com>
In-Reply-To: <CABcZeBMVcH74RYXZrLRNtHLi-xZgGxRHA2CsH6nbiz+5uGM32g@mail.gmail.com>
From: tirumal reddy <kondtir@gmail.com>
Date: Wed, 02 Sep 2020 18:01:59 +0530
Message-ID: <CAFpG3gcJeXyuJ4n8N6wyDvVJGkO1toVC4hUXjL6ACWg+sent+w@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
Cc: Christopher Wood <caw@heapingbits.net>, ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000199d2005ae53d3dc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/YTBWK_dGnSycUQd-zaAacG_f3Po>
Subject: Re: [Add] ADD Requirements Draft
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 02 Sep 2020 12:32:14 -0000

Please see inline

On Tue, 1 Sep 2020 at 22:16, Eric Rescorla <ekr@rtfm.com> wrote:

>
>
> On Tue, Sep 1, 2020 at 4:10 AM tirumal reddy <kondtir@gmail.com> wrote:
>
>> Hi Eric,
>>
>> Please see inline
>>
>> On Fri, 28 Aug 2020 at 19:08, Eric Rescorla <ekr@rtfm.com> wrote:
>>
>>>
>>>
>>> On Fri, Aug 28, 2020 at 12:35 AM tirumal reddy <kondtir@gmail.com>
>>> wrote:
>>>
>>>> On Thu, 27 Aug 2020 at 18:46, Eric Rescorla <ekr@rtfm.com> wrote:
>>>>
>>>>>
>>>>>
>>>>> On Wed, Aug 26, 2020 at 10:15 PM tirumal reddy <kondtir@gmail.com>
>>>>> wrote:
>>>>>
>>>>>> Hi Eric,
>>>>>>
>>>>>> Please see inline
>>>>>>
>>>>>> On Wed, 26 Aug 2020 at 16:50, Eric Rescorla <ekr@rtfm.com> wrote:
>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> As I said when you first proposed this in an ADD meeting, I do not
>>> believe that anything of this kind is viable.
>>>
>>
>>> 1. Certificates tied to a legal entity have not been effective, which is
>>> why browsers are removing EV.
>>>
>>
>> The draft does not propose using EV certificates for encrypted DNS
>> servers, please see
>> https://tools.ietf.org/html/draft-reddy-add-server-policy-selection-05#section-4 for
>> more details.
>>
>
> It proposes something similar, which I expect to have the same drawbacks.
>

Can you please explain the drawbacks for further discussion ?


>
>
> 2. There is ample evidence that users do not read privacy policies.
>>>
>>
>> The DNS server privacy statement is much more simpler compared to a
>> typical privacy statement by a
>> content service provider (see
>> https://tools.ietf.org/html/draft-ietf-dprive-bcp-op-14#section-6).
>>
>
> I don't think that makes it significantly more likely that people will
> read it.
>

It varies from person to person. People may not read the privacy statements
because they visit several domains in a day. The DNS operators a user will
use will be very few, for example an user may want to use a
discovered resolver in selected networks like Enterprise or Home network.
Further, encrypted DNS resolver publishing the privacy statement URL is a
best practise similar to the way OS mandating apps to publish privacy
policy.


>
>
> Further, automated analysis of a privacy statement is possible using deep
>> learning (https://pribot.org/files/Polisis_USENIX_Security_Paper.pdf).
>> You can explore polisis and pritbot at https://pribot.org to explore the
>> analysis of privacy statements by several organizations..
>>
>
> I took a quick look at this tool and while it appears to be interesting
> work, it does not produce output which I think is likely for users to
> actually assimilate. For instance here is what it does with McAfee's policy:
>
> https://pribot.org/polisis/?company_url=mcafee.com&_id=59d8f9c4e3dd0c4e24555c1d&category=first-party-collection-use
>

The summary page is quite easy for end users to review the
positives/negatives to watch out for and it also highlights the relevant
text in a large privacy document (see
https://pribot.org/polisis/?company_url=http%3A%2F%2Fmcafee.com&_id=59d8f9c4e3dd0c4e24555c1d&category=assessment).
The DNS server privacy statement is much more simpler compared to a typical
privacy statement for deep learning to identify if the server is
privacy-friendly.


>
> We've already run this experiment of machine readable privacy policies
> once with P3P and I don't see a reason to think this will be any different
>

No, the draft does not discuss any machine readable privacy policies other
than conveying the privacy statement URL.


>
> Taking a step back here: is there any client with significant usage that
> would be interested in consuming this kind of policy when published by a
> resolver? If so, I'd like to hear from them about their needs. If not, it
> doesn't seem worth discussing further.
>

The draft only discusses conveying resolver information and does not
discuss any machine parsable privacy policy.

-Tiru


>
> -Ekr
>
>