Re: [Add] A proposed charter for ABCD

Stephen Farrell <stephen.farrell@cs.tcd.ie> Sat, 04 January 2020 16:20 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5A7B212007C for <add@ietfa.amsl.com>; Sat, 4 Jan 2020 08:20:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level:
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id htPsprPEFl9B for <add@ietfa.amsl.com>; Sat, 4 Jan 2020 08:20:42 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8E62120046 for <add@ietf.org>; Sat, 4 Jan 2020 08:20:41 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 4B8AFBE50; Sat, 4 Jan 2020 16:20:39 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gVF442BlJnWe; Sat, 4 Jan 2020 16:20:37 +0000 (GMT)
Received: from [10.244.2.119] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 02CE3BE2F; Sat, 4 Jan 2020 16:20:36 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1578154837; bh=4J4p5ZiRnw0vqSwW/J5YEYBlykcFpguxv6DTe6cujnE=; h=To:References:From:Subject:Date:In-Reply-To:From; b=pyvInYlBtebo2xyzwQ5aREGuqyir1P9+DTGn8qG4rpjX0E9tvAXWLhk6AVGmAhXX+ /+VIcJtZC130UHidUpf2SeoRUnP5+tXEXFAH71PQUnKUH3TZi/tcrOoT0t0OLk5a6q 0XmUePTqL+dMtsTU6flyEw2JXjuR/cZUacOJ+XfA=
To: Ben Schwartz <bemasc=40google.com@dmarc.ietf.org>, ADD Mailing list <add@ietf.org>
References: <CAHbrMsACEWWFxw04KUc4Q66G4hf_P3V3eOnAHqw18PDxCn-b2g@mail.gmail.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Autocrypt: addr=stephen.farrell@cs.tcd.ie; prefer-encrypt=mutual; keydata= mQINBFo9UDIBEADUH4ZPcUnX5WWRWO4kEkHea5Y5eEvZjSwe/YA+G0nrTuOU9nemCP5PMvmh 5Cg8gBTyWyN4Z2+O25p9Tja5zUb+vPMWYvOtokRrp46yhFZOmiS5b6kTq0IqYzsEv5HI58S+ QtaFq978CRa4xH9Gi9u4yzUmT03QNIGDXE37honcAM4MOEtEgvw4fVhVWJuyy3w//0F2tzKr EMjmL5VGuD/Q9+G/7abuXiYNNd9ZFjv4625AUWwy+pAh4EKzS1FE7BOZp9daMu9MUQmDqtZU bUv0Q+DnQAB/4tNncejJPz0p2z3MWCp5iSwHiQvytYgatMp34a50l6CWqa13n6vY8VcPlIqO Vz+7L+WiVfxLbeVqBwV+4uL9to9zLF9IyUvl94lCxpscR2kgRgpM6A5LylRDkR6E0oudFnJg b097ZaNyuY1ETghVB5Uir1GCYChs8NUNumTHXiOkuzk+Gs4DAHx/a78YxBolKHi+esLH8r2k 4LyM2lp5FmBKjG7cGcpBGmWavACYEa7rwAadg4uBx9SHMV5i33vDXQUZcmW0vslQ2Is02NMK 7uB7E7HlVE1IM1zNkVTYYGkKreU8DVQu8qNOtPVE/CdaCJ/pbXoYeHz2B1Nvbl9tlyWxn5Xi HzFPJleXc0ksb9SkJokAfwTSZzTxeQPER8la5lsEEPbU/cDTcwARAQABtDJTdGVwaGVuIEZh cnJlbGwgKDIwMTcpIDxzdGVwaGVuLmZhcnJlbGxAY3MudGNkLmllPokCQAQTAQgAKgIbAwUJ CZQmAAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAUCWj6jdwIZAQAKCRBasvrxexcr6o7QD/9m x9DPJetmW794RXmNTrbTJ44zc/tJbcLdRBh0KBn9OW/EaAqjDmgNJeCMyJTKr1ywaps8HGUN hLEVkc14NUpgi4/Zkrbi3DmTp25OHj6wXBS5qVMyVynTMEIjOfeFFyxG+48od+Xn7qg6LT7G rHeNf+z/r0v9+8eZ1Ip63kshQDGhhpmRMKu4Ws9ZvTW2ACXkkTFaSGYJj3yIP4R6IgwBYGMz DXFX6nS4LA1s3pcPNxOgrvCyb60AiJZTLcOk/rRrpZtXB1XQc23ZZmrlTkl2HaThL6w3YKdi Ti1NbuMeOxZqtXcUshII45sANm4HuWNTiRh93Bn5bN6ddjgsaXEZBKUBuUaPBl7gQiQJcAlS 3MmGgVS4ZoX8+VaPGpXdQVFyBMRFlOKOC5XJESt7wY0RE2C8PFm+5eywSO/P1fkl9whkMgml 3OEuIQiP2ehRt/HVLMHkoM9CPQ7t6UwdrXrvX+vBZykav8x9U9M6KTgfsXytxUl6Vx5lPMLi 2/Jrsz6Mzh/IVZa3xjhq1OLFSI/tT2ji4FkJDQbO+yYUDhcuqfakDmtWLMxecZsY6O58A/95 8Qni6Xeq+Nh7zJ7wNcQOMoDGj+24di2TX1cKLzdDMWFaWzlNP5dB5VMwS9Wqj1Z6TzKjGjru q8soqohwb2CK9B3wzFg0Bs1iBI+2RuFnxLkCDQRaPVAyARAA+g3R0HzGr/Dl34Y07XqGqzq5 SU0nXIu9u8Ynsxj7gR5qb3HgUWYEWrHW2jHOByXnvkffucf5yzwrsvw8Q8iI8CFHiTYHPpey 4yPVn6R0w/FOMcY70eTIu/k6EEFDlDbs09DtKcrsT9bmN0XoRxITlXwWTufYqUnmS+YkAuk+ TLCtUin7OdaS2uU6Ata3PLQSeM2ZsUQMmYmHPwB9rmf+q2I005AJ9Q1SPQ2KNg/8xOGxo13S VuaSqYRQdpV93RuCOzg4vuXtR+gP0KQrus/P2ZCEPvU9cXF/2MIhXgOz207lv3iE2zGyNXld /n8spvWk+0bH5Zqd9Wcba/rGcBhmX9NKKDARZqjkv/zVEP1X97w1HsNYeUFNcg2lk9zQKb4v l1jx/Uz8ukzH2QNhU4R39dbF/4AwWuSVkGW6bTxHJqGs6YimbfdQqxTzmqFwz3JP0OtXX5q/ 6D4pHwcmJwEiDNzsBLl6skPSQ0Xyq3pua/qAP8MVm+YxCxJQITqZ8qjDLzoe7s9X6FLLC/DA L9kxl5saVSfDbuI3usH/emdtn0NA9/M7nfgih92zD92sl1yQXHT6BDa8xW1j+RU4P+E0wyd7 zgB2UeYgrp2IIcfG+xX2uFG5MJQ/nYfBoiALb0+dQHNHDtFnNGY3Oe8z1M9c5aDG3/s29QbJ +w7hEKKo9YMAEQEAAYkCJQQYAQgADwUCWj1QMgIbDAUJCZQmAAAKCRBasvrxexcr6qwvD/9b Rek3kfN8Q+jGrKl8qwY8HC5s4mhdDJZI/JP2FImf5J2+d5/e8UJ4fcsT79E0/FqX3Z9wZr6h sofPqLh1/YzDsYkZDHTYSGrlWGP/I5kXwUmFnBZHzM3WGrL3S7ZmCYMdudhykxXXjq7M6Do1 oxM8JofrXGtwBTLv5wfvvygJouVCVe87Ge7mCeY5vey1eUi4zSSF1zPpR6gg64w2g4TXM5qt SwkZVOv1g475LsGlYWRuJV8TA67yp1zJI7HkNqCo8KyHX0DPOh9c+Sd9ZX4aqKfqH9HIpnCL AYEgj7vofeix7gM3kQQmwynqq32bQGQBrKJEYp2vfeO30VsVx4dzuuiC5lyjUccVmw5D72J0 FlGrfEm0kw6D1qwyBg0SAMqamKN6XDdjhNAtXIaoA2UMZK/vZGGUKbqTgDdk0fnzOyb2zvXK CiPFKqIPAqKaDHg0JHdGI3KpQdRNLLzgx083EqEc6IAwWA6jSz+6lZDV6XDgF0lYqAYIkg3+ 6OUXUv6plMlwSHquiOc/MQXHfgUP5//Ra5JuiuyCj954FD+MBKIj8eWROfnzyEnBplVHGSDI ZLzL3pvV14dcsoajdeIH45i8DxnVm64BvEFHtLNlnliMrLOrk4shfmWyUqNlzilXN2BTFVFH 4MrnagFdcFnWYp1JPh96ZKjiqBwMv/H0kw==
Message-ID: <3d5da3a9-200f-61ea-0c78-3e7930f3003d@cs.tcd.ie>
Date: Sat, 04 Jan 2020 16:20:35 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2
MIME-Version: 1.0
In-Reply-To: <CAHbrMsACEWWFxw04KUc4Q66G4hf_P3V3eOnAHqw18PDxCn-b2g@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="23Hffe7d7xBKV1FGjwYPnLD6AEHklzneN"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/Z0PaQv_qx4OmGjZc09QSRW3LDrM>
Subject: Re: [Add] A proposed charter for ABCD
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 04 Jan 2020 16:20:45 -0000

Hiya,

The verbosity and lack of agreement and clarity on the list
since this was posted has convinced me that this is not a
viable charter.

That said, some (mostly negative, sorry;-) comments
below...

Cheers,
S.

On 20/12/2019 15:20, Ben Schwartz wrote:
> Hello ADD list,
> 
> Based on the feedback from the ABCD BoF at IETF 106, and with additional
> input from chairs and area directors from relevant working groups, the ABCD
> BoF chairs have drafted the following updated charter for a working group.
> Please review it and share your perspective.
> 
> Tommy Pauly has recently posted a charter text proposal that considers
> closely related issues. This is not a competition, so please avoid “voting”
> for one proposed text over the other.  The text of any final charter will
> be written by the IESG.  To help them judge whether a working group should
> be formed, and how it should be chartered, the most productive input would
> be to know which elements of each text you find valuable (if any), and
> which you would like to see changed in any final charter.

Tommy's proposal has the benefit of covering fewer topics.
I think that's (fewer topics) likely a requirement if any
progress is to be made.

> 
> -----------------------------------
> 
> Proposed charter text:
> 
> This working group will focus on DNS client side topics, particularly
> discovery and selection of resolvers. This complements existing DNS-related
> working groups, which are responsible for improvements to the DNS protocol
> itself, and for operational questions that are principally of interest to
> DNS server operators.

I like that you've tried to provide a logical functional
basis for what to in/exclude in the WG. However, my take
is that success/failure will be much more driven by the
non-functional aspects (e.g. cat-herding, not biting off
more than can be chewed) so I'm not sure this is needed,
even if it's clever;-)

> 
> The working group is chartered to develop an extensible protocol for a DNS
> client to learn detailed information about a resolver, based on
> draft-ietf-dnsop-resolver-information, which will be transferred from
> dnsop.

Using that to discover that a recursive offers DoT/DoH
seems to provide, at best, opportunistic security. But
I like opportunistic security approaches, where they're
useful, and it could be useful here, in some networks.
In other networks and for some applications, the OS
approach will provide no substantive benefit.

For opportunistic security to be useful also needs at
least a story/plan for how to get to something better. So
I think there's a major missing part here about
re-visited networks. (Even if aspects of that are
implementation-specific, the story is needed before we
know the opportunistic staging post is useful.)

I think a wg that doesn't start out with an agreed
understanding as to whether or not discovery being
opportunistic is ok or not will fail. There may even
be a need to catalog the various possible setups and how
discovery plays out in each in order to make progress.
(Recent list discussion with unqualified uses of the
term "trust" along with ambiguous pronouns seems to
indicate that may be needed.)

Even with all that, I'm not clear what'd motivate an
application (whether a browser or something else) to want
to do this, though I can see this possibly being useful
for a system or OS stub. I could also see some applications
using this as a way to be seen to be "doing something." All
that said, the "useful" here doesn't seem like a huge win
really in many networks. (IOW, if someone thinks defining
this will stop applications using their own choices of DoH
server, my guess is that that's wishful thinking.)

I don't understand the information leakage aspects of this, if a
non-updated recursive forwards the queries upward, nor
potential attacks (on stubs, launched by/via recursives)
this might enable. (E.g. does the nxdomain for the first
a.b.c.10.in-addr.arpa mean no other e.f.g.10.in-addr.arpa
will be forwarded for the TTL?)

I'm not convinced this putative wg is the right place to
develop an extensible protocol like this - dnsop seems much
better suited really, so I'd argue to leave that draft
in dnsop.

> Relying on this new protocol where appropriate, the working group
> should produce standards-track, informational, or experimental documents
> that provide the following items, using the drafts in brackets as input
> (with no obligation to adopt them):
>  * methods for a recursive resolver to advertise support for an alternative
> transport protocol [draft-sah-resinfo-doh],

The security considerations of that seem to me to make it
either pointless (already doing DoT/DoH) or impossible
(DNSSEC for 10.in-addr.arpa).

>  * methods for a recursive resolver to indicate that it will sometimes
> return DNS results that are different from the global DNS
> [draft-grover-add-policy-detection],

That bit seems ok, though canaries are fragile of course.
It's not clear to me that needs to be in the same WG as
the recursive discovery bits, but it could be.

I don't get why both TBD.arpa and <reverse-ip>.arpa would
need to be supported by recursive developers. ISTM one
kind of oddball qname for this stuff ought suffice for all
of the things envisaged in these drafts.

>  * methods for improving user privacy by avoiding DNS queries that leak
> information or directing them to a server that will have this information
> anyway [draft-pauly-dprive-adaptive-dns-privacy], and

I think that draft by itself (and what it implies) is
already the meat for an ambitious WG.

>  * a format for describing the client’s DNS configuration, suitable for
> diagnostics and debugging.

I'm not clear why this is needed.

Attempting all of the above is IMO way too ambitious given
the divergent interests and trust models visible in folks
postings to this list over the last 8 months.

> 
> Where possible, any mechanisms that specify exchange of information between
> clients and resolvers should provide the security properties expected of
> IETF protocols, e.g., confidentiality protection, integrity protection, and
> authentication with strong work factor.  Each specification must clearly
> indicate under what circumstances and assumptions these properties are or
> are not provided.

I'm not sure why including that boilerplate-like text is
a good idea.

> This working group will coordinate and share WGLC announcements with the
> following working groups: dnsop, capport, dprive, dhc, and homenet. The
> working group will also coordinate with the Security Area, and will be
> assigned a security advisor.

Assigned security advisors aren't that useful I think. The
person concerned is either interested or not, if they are
they'll not be shy. If they're not, they'll not be useful.

> 
> P.S. One note regarding this proposal: the chairs of the doh working group
> expect that doh would be closed if a new working group were chartered in
> this manner or similar.
> 
>