Re: [Add] Proposed charter and BoF request for IETF 106

Richard Barnes <rlb@ipv.sx> Wed, 09 October 2019 14:21 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEBD91200E0 for <add@ietfa.amsl.com>; Wed, 9 Oct 2019 07:21:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JLLbA8KI8mvh for <add@ietfa.amsl.com>; Wed, 9 Oct 2019 07:21:35 -0700 (PDT)
Received: from mail-oi1-x22a.google.com (mail-oi1-x22a.google.com [IPv6:2607:f8b0:4864:20::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B907E12006E for <add@ietf.org>; Wed, 9 Oct 2019 07:21:33 -0700 (PDT)
Received: by mail-oi1-x22a.google.com with SMTP id k25so1858907oiw.13 for <add@ietf.org>; Wed, 09 Oct 2019 07:21:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=mm2MjotiYEaV9h58bdji+easpSQhSwT6ustIivVX8UE=; b=oqbtdicJiBYRCuP4kHcPX6M2O3X5ES+v9o4nRKMtw9Bs2V0YasblNM3t6d+dygvhZA fYWwnWExfU6nnPMc5ylW76U8rC5qo+1lwBekH82wh9KI4CRvowVfoQoZStPlS2lCEETz M9CkqyAl+z/IV/3p4UOvtBvBJpyfySpZjLrV3M6LkKxzFkm7YxyIKoUjyx8BmnqJZu35 kIKg5o6+cbj3PxMjoOzNwnTYVKFcQ7HbeMzAbsKleGDPmcnbkpwQtLVmhvllrFU2W8B+ AVEUO9EW80zaWFlfvPqNcisI8JduS5ZMNGDaL/VLWNJfiba4YzP1UgNxNWnUpwHbTpaY 1dCg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=mm2MjotiYEaV9h58bdji+easpSQhSwT6ustIivVX8UE=; b=l1kwx4EvFUtFBl1W87IYCtkVS85SLp5wRu0I4/LfDto3RD+CJe+HFX9ImE7S42c/2Z m7baqJH7CP372jWSBTXfk9Nhasz/tIniWo15SlFdY7XnFDuw7N1K9Ed4+feOcWZBlyt+ CoTWh7sCKJl15Lfw6m4BH0rqNySFA6Ox4hL2F/hC8+kJffrQ2zdHqaQdPvrXSn/Tqhx/ N0Z37IbxgYO/GRVMxJikZH+vAOtBWkFuKpox6kQD/vGzIoAvrcCnoz9HHKLXFcWrXzUk bGcB18LNYzKbTwSuAKoLEwQnlhXACb0IKQ9mtsoLlGCIC+qG7JSU4rwPxHzlVMbARFTP g3jg==
X-Gm-Message-State: APjAAAWXklr4ufL5QxdRXSWlgO37DiLnTMqf6aIgVSqNs3wCNETuoSg8 ofE5XhIIkp0cD6zqXH5TFJxWCsKOvHpaSXGCsXgdOoaQqpw=
X-Google-Smtp-Source: APXvYqzXwBSQYPkOR6i1t6H07Ml250N8nhiWunAY1tLZOHK+ckqy8QoCQ4fWuhlmF9YI+vQaOkXk6ICrS2QchW/nJnI=
X-Received: by 2002:aca:d5d5:: with SMTP id m204mr2480679oig.36.1570630892740; Wed, 09 Oct 2019 07:21:32 -0700 (PDT)
MIME-Version: 1.0
References: <CALaySJLxXVuHQNfTnaeKZ_R9xtBYWfbta+A1bWcE-ZQZwd3VZg@mail.gmail.com> <CABcZeBMkAFZW9mWjw92v+OR0Fa8ed+P80yc78eY07hCpsCNY6Q@mail.gmail.com> <CABcZeBOOq4FHVoxsyApzOc4VtTbMwZn7858-E+4kr21Z0r5wrA@mail.gmail.com>
In-Reply-To: <CABcZeBOOq4FHVoxsyApzOc4VtTbMwZn7858-E+4kr21Z0r5wrA@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Wed, 09 Oct 2019 10:21:20 -0400
Message-ID: <CAL02cgR_61TNnPy=ios+hQFs_tjfYNXu-sBpbDL-HBY+QsY40A@mail.gmail.com>
To: add@ietf.org
Content-Type: multipart/alternative; boundary="0000000000006f788505947b00b9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/jK4vdwH8lAxN1BDnuwzX0PUL4es>
Subject: Re: [Add] Proposed charter and BoF request for IETF 106
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Oct 2019 14:21:38 -0000

I think EKR is on the right track here.

There is a bright line here between technology and deployment policy.  The
former we have some hope of progressing on, and there are meaty questions
around how applications can discover local network capabilities and
preferences in a way that is not open to abuse like the mechanisms we have
today.  On questions of the latter form, the entire history of this list,
and the meeting that preceded it demonstrate, that there is very little
hope of consensus.

The charter right now has some of both.  If this charter is to go forward,
it should be refactored to focus on engineering questions, and avoid policy
questions.  In particular, the BCP item needs to be struck.

--RLB

On Wed, Oct 9, 2019 at 9:50 AM Eric Rescorla <ekr@rtfm.com> wrote:

>
> Barry,
>
> I took a first look at your proposed ABCD charter. Thanks for
> proposing something.
>
> At a high level, I think there are some good areas for discussion
> here, but they're going to get swamped by the inclusion of a bunch of
> contentious topics we're not likely to get resolution on.
>
> I think this would be much stronger if it focused entirely
> on technical matters on which there is at least some agreement,
> specifically:
>
> - Signalling that the network has DoH support, who provides it,
>   and (potentially) what their policies are.
>
> - Signaling that the network has some kind of filtering policy
>   that might make the application think twice about using
>   DoH.
>
> - Something like the apple proposal that does "steering" of
>   traffic to the right resolver.
>
> Note that these mechanisms should generally not tell apps what
> policies they should follow when they see these signals.
>
>
> These seem to be on your list below. I think we should stay away from
> anything that is about specifying best current practices because as
> far as I can tell all but the most trivial ones (here is how to safely
> run a TLS server or something) are contested. For instance, even
> retention period has very strong views on both sides.
>
>
> > Together, these developments may represent
> > a set of shifts depending on how the new protocols are deployed: from
> > cleartext to encrypted transports; from use of unique port numbers for
> > DNS resolution to ports that support significant other traffic (e.g.,
> > HTTPS); from network operator control of DNS configuration to control by
> > clients, third-party resolvers, or others; and from the use of a large,
> > dispersed set of network operator resolvers to a smaller set of more
> > centralized resolvers operated by other parties.
>
> The word "may" is doing a lot of work here. In particular, while I
> realize that this centralization argument has been repeatedly raised,
> it's not really a point of consensus. Consider that in the United
> States, the ISP market is dominated by a very small number of players,
> with two companies, Charter and Comcast, having the vast majority of
> the market
> (
> https://www.statista.com/statistics/217348/us-broadband-internet-susbcribers-by-cable-provider/
> )
> Because residential customers generally use the ISP resolver, this
> market is already highly centralized. It's true that there are a lot
> of much smaller enterprise resolvers, but every major
> application-level DNS rollout I have seen proposed attempts to
> preserve that situation.
>
>
>
> > This potential set of shifts raises many questions given the long history
> > and current status of DNS operational practices. Network operators have
> > historically used DNS services for a variety of purposes beyond simple
> > query resolution: to mitigate network and security threats, to enforce
> > enterprise policy, to provide parental controls and other filters, and to
> > comply with relevant laws and regulations, among others.
>
> This list of practices would be much more accurate if it included the
> resolver-level DNS practices that we are trying to mitigate using DoH,
> including NXDOMAIN synthesis and collection of user browsing history
> data.
>
>
> > Achieving these
> > objectives while providing confidentiality and tamper-resistance will
> > generally require that network operators shift to one of the available
> > encrypted transports for their resolvers and that clients include
> > configuration options to select them.
>
> This entirely misses the point, which isn't just to do a lot of encryption
> but to provide security for the user. Just having network operators
> transition to secure transports while continuing their current practices
> does not address the issue.
>
>
> > Specific initial areas of focus include:
> >
> > - Resolver discovery
> > - Expression of resolver policy
> > - Query routing in the presence of resolver choice
> > - Best Current Practices for the deployment and operation of encrypted
> DNS transport
>
> This seems like it leaves all of the contested issues firmly
> in scope. I can't imagine how we're going to get consensus on
> best current practices, when we can't even agree on the terms
> for resolver selection.
>
> -Ekr
>
> On Wed, Oct 9, 2019 at 12:39 AM Barry Leiba <barryleiba@computer.org>
> wrote:
>
>> Hi, all,
>>
>> The IESG has worked up a proposal for a possible working group, which
>> we're tentatively calling "ABCD", for "Application Behavior
>> Considering DNS".  We can discuss the charter proposal here, and
>> expect to approve a working-group-forming BoF for Singapore.
>>
>> I realize that the charter proposal isn't going to please everyone
>> (and perhaps will please no one), but it's something that, at a first
>> level of review, the IESG accepts and will likely want to move forward
>> with.
>>
>> See the proposal here:
>>       https://trac.tools.ietf.org/bof/trac/wiki/WikiStart
>>
>> I am also going to remove the moderation of this list for now.  Let's
>> see how that goes.  Please continue being calm, thoughtful, and
>> respectful (and thanks for having done that during the moderation
>> period).
>>
>> Barry
>>
>> --
>> Add mailing list
>> Add@ietf.org
>> https://www.ietf.org/mailman/listinfo/add
>>
>