Re: [Add] [EXTERNAL] Re: draft-grover-add-policy-detection-00

Eric Rescorla <ekr@rtfm.com> Tue, 16 July 2019 19:31 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 535A612067E for <add@ietfa.amsl.com>; Tue, 16 Jul 2019 12:31:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2V6XKEi_oyJB for <add@ietfa.amsl.com>; Tue, 16 Jul 2019 12:31:47 -0700 (PDT)
Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com [IPv6:2a00:1450:4864:20::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C580E1206A1 for <add@ietf.org>; Tue, 16 Jul 2019 12:31:46 -0700 (PDT)
Received: by mail-lj1-x22a.google.com with SMTP id t28so21114306lje.9 for <add@ietf.org>; Tue, 16 Jul 2019 12:31:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=MyBr4Wh6ehXd7q72N/czPhfvDoHKyaWQVuDP+wG/1FM=; b=oEVsbIy5sh1LPqSMH3q06y4ZbhKJ4rbogIc9VzuJOG6STHDaGrLeyONeuu8/T7kEmE flgy63skNJp9rcR1muuJ48Mtr9Kk0pL+hXP9Wz1Le1T1TKUm6xQGuU73sLLhER3Wvq8H U7NJouIh5n5xWqbOCb77SFBP7UyOmEMarA/9Jt2rgYPS7XM7210TW3g/VN2m304zdfyQ JjbK3NIrRnZeTNxf5Jbpwxl2H3r8Pf14X4cZoGifgBgcIi+xZxrrSbMJc97fCUt+xEd1 2AJsXo99Ax5TwG11nHKgnUssCuFGdXGEKbOFUSsvaZJRR1xED4MbdDbbjsGA9QiPDipQ BpmA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=MyBr4Wh6ehXd7q72N/czPhfvDoHKyaWQVuDP+wG/1FM=; b=e7J5gm0/Cuuv1gCivaKkjnBmjOdroA73eemI49iKce24ysm1WB6PCKn3jhM+MOd+4O X9CE22SslzyZYqCn/WCGE9aYsDMHUndpfsujqjh3I54Za2ilgvY07nfZ8m2Z3UHN4lRY 31Yu+wSMZNGcfLwY932e/1ZmAv1krVRu74lbtHGg2OX9h4MKPsw0UbJ2e3kD4zcD52st 1P6cgvyjQ3sHg6jf3ccRprka7hAFcBRqUQh2UeVIbiss2Y1eiftnU8Ixma5AQ1aTPqWZ ZVF5RP9s0BNwAm7p2utekQGHA36mqtL804VkbUpcZ6NEgoZv8HFZ+H/EvPb7LdrabKiP 3Pxw==
X-Gm-Message-State: APjAAAX74FZaGA7R361IhcWE/9YRZVht485hIdLkWZenji6tdMGWCBRq ObpayO/RM4KXBkJKjbcJ9xWiqz32SNOsJaOFVGc=
X-Google-Smtp-Source: APXvYqweDSti9KHKgD2tVXt5suFyZbXwDyApUak16W74GLfWb/zcMch+UCrpEZz0/mptj8Kg4AhgxcM88+UpPj4yb5M=
X-Received: by 2002:a2e:9b84:: with SMTP id z4mr1793049lji.75.1563305505092; Tue, 16 Jul 2019 12:31:45 -0700 (PDT)
MIME-Version: 1.0
References: <CAChr6SwEUz9MrdRA0bnv9f-oNi0oUHkfRKjd9-o6jwhuckLXdw@mail.gmail.com> <CAFWeb9LNdT=EYVKTsYDxcBCQKoQFNShKotYtWujt4U9GA-V1mg@mail.gmail.com> <CAFWeb9+eWKSKY9O2JLn9-0+Zq7hrD48F-y+Y4T-iRaaF0vtdOA@mail.gmail.com> <A45F4F74-D6C1-435A-A52F-C2DEA82E2999@sky.uk> <CAFWeb9JVBj+Yehup5q4v9X-7XDY+02frd-04AQGL2HoSLON2qA@mail.gmail.com> <CABcZeBMY9q9vKGse1svzbvXF_dSHA+9q06j4ugDVCZP9VT1koQ@mail.gmail.com> <CAChr6Sz5Rfz=UxOYuPguSvVK2HCX2ZoA1-FytW7+EOUxN8y46Q@mail.gmail.com> <CABcZeBNB7ASu2U3ZMBZ+OOxEhbSnhDXwFN3Lsex1uzVSDv3R=Q@mail.gmail.com> <CAChr6SwEwRRX7BA6ZCeBuC93hFxbfi3d7G_3G3VA7Lm09yuneg@mail.gmail.com> <CABcZeBNa97Vb6Fw-fMhoZnMezGtm3nJODENN4=XXsz7GWxf2Cg@mail.gmail.com> <CAChr6Sxm__NroZ92v4HL_6iCa62fwYgNw9r8ZDAxCdzVwNoDGw@mail.gmail.com> <CAChr6SyHjafF-m_-ihEXCAHa=QbUDPd3PAiSW8EQDT58DhBBCw@mail.gmail.com>
In-Reply-To: <CAChr6SyHjafF-m_-ihEXCAHa=QbUDPd3PAiSW8EQDT58DhBBCw@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 16 Jul 2019 12:31:08 -0700
Message-ID: <CABcZeBM5Cr7+GBf7Niq-M_3wR+ukG4D_BqOTB=_KwmhNcOTV7A@mail.gmail.com>
To: Rob Sayre <sayrer@gmail.com>
Cc: Alec Muffett <alec.muffett@gmail.com>, add@ietf.org, "Dixon, Hugh" <Hugh.Dixon@sky.uk>
Content-Type: multipart/alternative; boundary="0000000000004e90c9058dd16d34"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/ce47nE9o4eAJZdDhIiZ375XTIN4>
Subject: Re: [Add] [EXTERNAL] Re: draft-grover-add-policy-detection-00
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Jul 2019 19:31:56 -0000

On Tue, Jul 16, 2019 at 11:55 AM Rob Sayre <sayrer@gmail.com> wrote:

>
>
> On Tue, Jul 16, 2019 at 11:49 AM Rob Sayre <sayrer@gmail.com> wrote:
>
>>
>>
>> On Tue, Jul 16, 2019 at 10:22 AM Eric Rescorla <ekr@rtfm.com> wrote:
>>
>>>
>>>
>>> On Tue, Jul 16, 2019 at 9:10 AM Rob Sayre <sayrer@gmail.com> wrote:
>>>
>>>> In any case, BCP 188 covers the issue we're describing quite well.
>>>>
>>>> "The same techniques to achieve [Pervasive Monitoring] can be used
>>>> regardless of motivation.  Thus, we cannot defend against the most
>>>> nefarious actors while allowing monitoring by other actors no matter how
>>>> benevolent some might consider them to be, since the actions required of
>>>> the attacker are indistinguishable from other attacks."
>>>>
>>>> Pervasive Monitoring Is an Attack
>>>> https://tools.ietf.org/html/rfc7258
>>>>
>>>
>>> I'm quite familiar with this BCP but given it's emphasis on passive
>>> monitoring and the associated interest in opportunistic security (RFC 7435)
>>> I don't see any conflict here.
>>>
>>
>> I think the conflict is that the BCP states that the perceived
>> benevolence of an application (parental controls, malware blockers, etc)
>> doesn't matter, but that seems to be the case being made here.
>>
>> Aside from that seemingly obvious conflict, it doesn't seem like
>> DNS-based solutions would really work very well for these benevolent
>> applications. It's sort of like using a coffee cup as an umbrella--it will
>> catch some rain, yes.
>>
>
> Oh, also, RFC 7435 is Informational, while RFC 7258 is a BCP. BCPs are the
> documents that describe what the IETF is supposed to be doing, right?
>

Well, sort of. But in this case, 7435 is a Consensus document, it just
doesn't have normative force. Thus, I think it's reasonably strong evidence
that opportunistic security isn't inconsistent with 7258. IIRC Stephen
Farrell was AD at the time, so perhaps he'd be willing to offer his
perspective.

-Ekr


> thanks,
> Rob
>
>
>>
>> thanks,
>> Rob
>>
>>
>>
>>>
>>> -Ekr
>>>
>>>
>>>
>>>>
>>>> thanks,
>>>> Rob
>>>>
>>>>