[Add] meeting hum: should the IETF take up this work?

Rob Sayre <sayrer@gmail.com> Tue, 23 July 2019 22:09 UTC

Return-Path: <sayrer@gmail.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0DA0112001B for <add@ietfa.amsl.com>; Tue, 23 Jul 2019 15:09:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FGlowtD304xR for <add@ietfa.amsl.com>; Tue, 23 Jul 2019 15:09:33 -0700 (PDT)
Received: from mail-io1-xd32.google.com (mail-io1-xd32.google.com [IPv6:2607:f8b0:4864:20::d32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C27E120103 for <add@ietf.org>; Tue, 23 Jul 2019 15:09:33 -0700 (PDT)
Received: by mail-io1-xd32.google.com with SMTP id g20so85197640ioc.12 for <add@ietf.org>; Tue, 23 Jul 2019 15:09:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=KawB9ICmJLC/JRnfYMUyUd5ZkDok/J9w+2+UtjHP83E=; b=KfZQdjxtYdYthmQ5yEM0bT6ryom3UlvABq/UbjHwbPGR0MTbaG3JmR5Jd4bspnVylD 8S0taXXx/bE+3AExfUZNKZRMSoF/liFYDQm4KtSVtHSE+NKn3OQQ8mGGXMNmL+j2ebLK g/r2+Kj0lGL8PLSM5+BPxC5N5dk17t6EkbDUUd/eHgXo1EF9CkE2NchszTuPodMHwm8P MOHhCjepdoBlueiQMiPJZV6Aefg4GG0joVDnjQfQmmy0AjylAfY4Zq1vM4gcoV/MPreI mLYnauBdvQ08AiYyQBMmwFhWf85KMHgFGvC+R0U94UAiGq5Gq7XjGzZyXwcZWpKGJoOK L/nw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=KawB9ICmJLC/JRnfYMUyUd5ZkDok/J9w+2+UtjHP83E=; b=VU/SasSNRmQnIO5jXl3FuTHebdS1mgNTFMlQxJiAe7sLO+StrDngakzQyEsQ6phs7Z 2XrjQdORm6mnubp4BPMs/NVMlXzMSPnerLVEDpS6EFPeO9C1OIBPa8oLlNwh2n88S5RT /Z0Fk/OafQ2zn6b40GlxMFsv7cEbY2p66+ZMo+zydhPbIEVza46eGQr6MY03w/Y98Thg TWor4Ka/ZSwYSbBDp7vL6oxDJI0tbCZr2LqEWLZlVNlt19RTU9VEaOQPjTVXaAlqi/Aq Wtt5a75B4qMUr0GTmwz+9v3uC1dNiS97xUlJwP80rrLUqd0oGIKccAuvFTdjRkIaqUFw gq4w==
X-Gm-Message-State: APjAAAW4IizJYUNfNg0OaJLyD4LA1epPfcppvfIFPfykA3d9/UIKeBZF MLPmF/qLqCA0yU4YOSPdpj65eUakFODqUHrhVZUR95t8EGAJMQ==
X-Google-Smtp-Source: APXvYqxk/+UQ2j7LkYfruYDa3qouRgM0dxW2AMVvYjbN1ro6Cn9vMZBvEsloFVHnNfRJR3uZbXlmUnoUjni+XPP16/4=
X-Received: by 2002:a02:1a86:: with SMTP id 128mr32288283jai.95.1563919772039; Tue, 23 Jul 2019 15:09:32 -0700 (PDT)
MIME-Version: 1.0
From: Rob Sayre <sayrer@gmail.com>
Date: Tue, 23 Jul 2019 15:09:20 -0700
Message-ID: <CAChr6Sx9TEt6CMzRRrdb-HwT_k987oW=4yF1FCbDF17zkaE2Vg@mail.gmail.com>
To: add@ietf.org, Barry Leiba <barryleiba.mailing.lists@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000783db9058e607240"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/Z0nq8XsGUSEku6wJAD0pZaxhhhs>
Subject: [Add] meeting hum: should the IETF take up this work?
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Jul 2019 22:09:35 -0000

Hi,

The IETF shouldn't take up work in reaction to non-technical (aka "policy")
concerns about imminent deployment of an approved RFC. In this case, it's
DoH (https://tools.ietf.org/html/rfc8484).

Mozilla's presentation accurately stated that DNS is no longer an effective
control surface. It can't be, given that HTTPS is ubiquitous, and one can
use it to tunnel any protocol.

thanks,
Rob