Re: [Add] Fwd: New Version Notification for draft-mglt-abcd-doh-privacy-analysis-00.txt

Christian Huitema <huitema@huitema.net> Wed, 06 November 2019 23:37 UTC

Return-Path: <huitema@huitema.net>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB9401200A4 for <add@ietfa.amsl.com>; Wed, 6 Nov 2019 15:37:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q9FMjRtFzaxX for <add@ietfa.amsl.com>; Wed, 6 Nov 2019 15:37:21 -0800 (PST)
Received: from mx36-out10.antispamcloud.com (mx36-out10.antispamcloud.com [209.126.121.30]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D2D8120052 for <add@ietf.org>; Wed, 6 Nov 2019 15:37:18 -0800 (PST)
Received: from xse112.mail2web.com ([66.113.196.112] helo=xse.mail2web.com) by mx3.antispamcloud.com with esmtp (Exim 4.89) (envelope-from <huitema@huitema.net>) id 1iSUrB-0008NN-TX for add@ietf.org; Thu, 07 Nov 2019 00:37:08 +0100
Received: from xsmtp21.mail2web.com (unknown [10.100.68.60]) by xse.mail2web.com (Postfix) with ESMTPS id 477jXw0r0Sz6pXr for <add@ietf.org>; Wed, 6 Nov 2019 15:34:08 -0800 (PST)
Received: from [10.5.2.12] (helo=xmail02.myhosting.com) by xsmtp21.mail2web.com with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:256) (Exim 4.92) (envelope-from <huitema@huitema.net>) id 1iSUoS-000704-08 for add@ietf.org; Wed, 06 Nov 2019 15:34:08 -0800
Received: (qmail 8139 invoked from network); 6 Nov 2019 23:34:07 -0000
Received: from unknown (HELO [192.168.1.101]) (Authenticated-user:_huitema@huitema.net@[172.58.43.152]) (envelope-sender <huitema@huitema.net>) by xmail02.myhosting.com (qmail-ldap-1.03) with ESMTPA for <daniel.migault=40ericsson.com@dmarc.ietf.org>; 6 Nov 2019 23:34:07 -0000
To: Vittorio Bertola <vittorio.bertola@open-xchange.com>, Bob Harold <rharolde@umich.edu>
Cc: "add@ietf.org" <add@ietf.org>, Daniel Migault <daniel.migault=40ericsson.com@dmarc.ietf.org>
References: <157288444149.16545.17250458995529707952.idtracker@ietfa.amsl.com> <CADZyTk=5g7toa5QwaQ9tCO1d2iJ1-pF9W6RzOEi9MjrsnyLsFw@mail.gmail.com> <2f52a096-ae14-a9f8-1dbf-8931e3204ec7@cs.tcd.ie> <SN2PR00MB0077009FBBB40FB2B3DD9B35FA790@SN2PR00MB0077.namprd00.prod.outlook.com> <CA+nkc8Aw+PPktomjwydWtfvVyM6Phhn9YbL33WV65-sbS0k1AA@mail.gmail.com> <1030648680.29401.1573073455702@appsuite-gw1.open-xchange.com>
From: Christian Huitema <huitema@huitema.net>
Autocrypt: addr=huitema@huitema.net; prefer-encrypt=mutual; keydata= mQENBFIRX8gBCAC26usy/Ya38IqaLBSu33vKD6hP5Yw390XsWLaAZTeQR64OJEkoOdXpvcOS HWfMIlD5s5+oHfLe8jjmErFAXYJ8yytPj1fD2OdSKAe1TccUBiOXT8wdVxSr5d0alExVv/LO I/vA2aU1TwOkVHKSapD7j8/HZBrqIWRrXUSj2f5n9tY2nJzG9KRzSG0giaJWBfUFiGb4lvsy IaCaIU0YpfkDDk6PtK5YYzuCeF0B+O7N9LhDu/foUUc4MNq4K3EKDPb2FL1Hrv0XHpkXeMRZ olpH8SUFUJbmi+zYRuUgcXgMZRmZFL1tu6z9h6gY4/KPyF9aYot6zG28Qk/BFQRtj7V1ABEB AAG0J0NocmlzdGlhbiBIdWl0ZW1hIDxodWl0ZW1hQGh1aXRlbWEubmV0PokBOQQTAQIAIwUC UhFfyAIbLwcLCQgHAwIBBhUIAgkKCwQWAgMBAh4BAheAAAoJEJNDCbJVyA1yhbYH/1ud6x6m VqGIp0JcZUfSQO8w+TjugqxCyGNn+w/6Qb5O/xENxNQ4HaMQ5uSRK9n8WKKDDRSzwZ4syKKf wbkfj05vgFxrjCynVbm1zs2X2aGXh+PxPL/WHUaxzEP7KjYbLtCUZDRzOOrm+0LMktngT/k3 6+EZoLEM52hwwpIAzJoscyEz7QfqMOZtFm6xQnlvDQeIrHx0KUvwo/vgDLK3SuruG1CSHcR0 D24kEEUa044AIUKBS3b0b8AR7f6mP2NcnLpdsibtpabi9BzqAidcY/EjTaoea46HXALk/eJd 6OLkLE6UQe1PPzQC4jB7rErX2BxnSkHDw50xMgLRcl5/b1a5AQ0EUhFfyAEIAKp7Cp8lqKTV CC9QiAf6QTIjW+lie5J44Ad++0k8gRgANZVWubQuCQ71gxDWLtxYfFkEXjG4TXV/MUtnOliG 5rc2E+ih6Dg61Y5PQakm9OwPIsOx+2R+iSW325ngln2UQrVPgloO83QiUoi7mBJPbcHlxkhZ bd3+EjFxSLIQogt29sTcg2oSh4oljUpz5niTt69IOfZx21kf29NfDE+Iw56gfrxI2ywZbu5o G+d0ZSp0lsovygpk4jK04fDTq0vxjEU5HjPcsXC4CSZdq5E2DrF4nOh1UHkHzeaXdYR2Bn1Y wTePfaHBFlvQzI+Li/Q6AD/uxbTM0vIcsUxrv3MNHCUAEQEAAYkCPgQYAQIACQUCUhFfyAIb LgEpCRCTQwmyVcgNcsBdIAQZAQIABgUCUhFfyAAKCRC22tOSFDh1UOlBB/94RsCJepNvmi/c YiNmMnm0mKb6vjv43OsHkqrrCqJSfo95KHyl5Up4JEp8tiJMyYT2mp4IsirZHxz/5lqkw9Az tcGAF3GlFsj++xTyD07DXlNeddwTKlqPRi/b8sppjtWur6Pm+wnAHp0mQ7GidhxHccFCl65w uT7S/ocb1MjrTgnAMiz+x87d48n1UJ7yIdI41Wpg2XFZiA9xPBiDuuoPwFj14/nK0elV5Dvq 4/HVgfurb4+fd74PV/CC/dmd7hg0ZRlgnB5rFUcFO7ywb7/TvICIIaLWcI42OJDSZjZ/MAzz BeXm263lHh+kFxkh2LxEHnQGHCHGpTYyi4Z3dv03HtkH/1SI8joQMQq00Bv+RdEbJXfEExrT u4gtdZAihwvy97OPA2nCdTAHm/phkzryMeOaOztI4PS8u2Ce5lUB6P/HcGtK/038KdX5MYST Fn8KUDt4o29bkv0CUXwDzS3oTzPNtGdryBkRMc9b+yn9+AdwFEH4auhiTQXPMnl0+G3nhKr7 jvzVFJCRif3OAhEm4vmBNDE3uuaXFQnbK56GJrnqVN+KX5Z3M7X3fA8UcVCGOEHXRP/aubiw Ngawj0V9x+43kUapFp+nF69R53UI65YtJ95ec4PTO/Edvap8h1UbdEOc4+TiYwY1TBuIKltY 1cnrjgAWUh/Ucvr++/KbD9tD6C8=
Message-ID: <3ef66a79-3b18-8f42-b21a-653c4e19a9cc@huitema.net>
Date: Wed, 06 Nov 2019 15:34:07 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.2.1
MIME-Version: 1.0
In-Reply-To: <1030648680.29401.1573073455702@appsuite-gw1.open-xchange.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
X-Originating-IP: 66.113.196.112
X-Spampanel-Domain: xsmtpout.mail2web.com
X-Spampanel-Username: 66.113.196.112/32
Authentication-Results: antispamcloud.com; auth=pass smtp.auth=66.113.196.112/32@xsmtpout.mail2web.com
X-Spampanel-Outgoing-Class: unsure
X-Spampanel-Outgoing-Evidence: Combined (0.15)
X-Recommended-Action: accept
X-Filter-ID: Mvzo4OR0dZXEDF/gcnlw0T9zDZOvA8ND4p2eQxdfzLSpSDasLI4SayDByyq9LIhVUZbR67CQ7/vm /hHDJU4RXkTNWdUk1Ol2OGx3IfrIJKywOmJyM1qr8uRnWBrbSAGDNzOpszOkW3faMySFwG163+fH zJ6mVE7ewsipSVIfs4Z/Wf+PAmZ1Y/rAnb0A1IyRgyWFxOA5dILPypvKxNVhWQwOVcNrdpWfEYrY fLBY3+cQQhZSeJ8jeX+/kepX1HHyIRFsicyJMEhQFtD8PLoinqRXC8R0jJlQpL+O8efQpgSip/+w zjuHtjdobcvrk7ssrdg1SRrHBwMVNLEidt64F8Z402BwMrJcZDa2ihhGrGxmgXyiGH9bdc8dtMYg LN+lK34oRmH8l+0JTL2l7MgE6xSw+lznxW4b4RTKAAkKNYOWB41mTq6pv8sGfKX7Wgabg7Mfc4Wg xT6TydOIX0aacqQGTyBVRmXoU6H7TsfBldIYFBl6VX84fRovDGikEvLuwH0r+197ykuYmDR9wbL2 DBEuqNMl4E+tMKMsv/A3u4xFRxF9LSHNsZFl22lrRRn/H0knlMgOQTVp+x1fo2EPm2HbJjFIz+wU pq20toWhA4cN5u1dXNK2RnkSbn9ilXsXLKPvWn9GxGU5BYNVd41/UAeYUOp7A73HI6oJg7w/Voeh 7DxBq1ddbO1TMfLqf5gHXNl2PZeaHdj4N+5hPjCDVF1677oPXF7r5zsW33ZNliqzwES3a0ULUNAa F84x6Jj3e34TY+s3lj/RgDQoaICKQ9Q84QG89JN6MvpNdzLqW7ocmsaGawDMjyOK4SZ06/LZHHAS JNUmoOHSoqgqxfHmWRWcrRhLeB34s3hUb32GO+1Kr28l+APxrqdcADZneb4D08QV3No+S2msRDep v5w/kkG0v17AmegcpQ0tml/sN9lmMy/o83jVXTcfb9k0nLWblJy7uxV6dw8jzlsaNZe6hynMJcjx DydxsJEju76A7X1QIVydqXpZ6MHhiKws9Iiut28r9wo4SqUIg8Yh9hAM0n3LLzx/F2gT3wl8JQJv Bho=
X-Report-Abuse-To: spam@quarantine11.antispamcloud.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/_OPPL-azYIdbpUvFkBsWYLqS7w8>
Subject: Re: [Add] Fwd: New Version Notification for draft-mglt-abcd-doh-privacy-analysis-00.txt
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Nov 2019 23:37:23 -0000

On 11/6/2019 12:50 PM, Vittorio Bertola wrote:

> Regarding Daniel's draft, I appreciate the effort and I partly tried
> to do this and other analyses in my draft for Prague, but I then
> realized that there are people here that will never consent to such a
> document becoming an agreed standard, even if informational. So I
> suggest that we should focus on a few technical developments for
> interoperability purposes that we can agree upon, such as standardized
> ways for the local network to advertise their own Do* service and
> their use of it for local policy enforcement, and give up discussions
> on deployment models and human rights assessments. I don't think we
> could ever get to agreement here on whether DoH brings more privacy
> and freedom or less of it, as the answer is really "it depends". 


Daniel's draft is certainly biased towards Daniel's opinions. For
example, I don't buy his assertion that replacing the OS defaults by app
decisions is always unfriendly to privacy. It is very easy to find
counter-examples. But there are a couple of facts that we should
acknowledge:

1) In general, the local network can retrieve the name of the server by
looking at the traffic. This is obvious when the communication happens
in clear text. It is also true if the traffic is encrypted using TLS
versions 1.2 or lower, because the server certificate is carried in
plain text. And it is still true if using TLS 1.3 but the SNI is not
encrypted.

2) Because of that, in general, sending the DNS request to a third party
resolver can only result in a loss of privacy. Even if the third party
resolver has a virtuous approach to privacy, the fact remains that in
general information that was present in just one place is now present in
two, and that cannot be described as a gain.

3) But of course there are exceptions to this general rule, specifically
when the traffic uses TLS 1.3 and ESNI. That's where Daniel's draft is a
bit weak. It develops the arguments (1) and (2), but stops there and
does not recognize the exceptions.

One first exception happens when the DNS requests to the local resolver
are not encrypted. This does not create a privacy leak against passive
attackers, because the passive attacker that sees the DNS traffic most
likely also sees the data traffic, as discussed in (1). However,
encryption also protects against active attacks in which the attacker
sends spoofed DNS responses. Using a third party encrypted server in
this scenario is a trade-off between security and slightly worse privacy
(point 2).

Another exception happens when the traffic uses TLS 1.3 and ESNI. In
that case, traffic analysis only reveals a communication with the
fronting server, while DNS queries reveal the hidden server. Resolving
the ESNI record through a trusted third party resolver will hide the
hidden service name from the local network, and that is indeed a gain in
privacy.

It is possible to extend this privacy advantage in two ways:

1) The client could obtain the ESNI record (or equivalent HTTPSVC
record) through other paths than the DNS, e.g. during prior connections
with the hidden service.

2) If the client has cached the content of the ESNI record (or
equivalent HTTPSVC record), it knows in advance the name of the fronting
server. If the client has not also cached the address, it will get
better privacy by looking up the fronting server name through the local
resolver. That will prevent providing the third party service with
information about timing of connections from the client.

-- Christian Huitema