Re: [Add] [EXTERNAL] Re: draft-grover-add-policy-detection-00

Paul Ebersman <list-add@dragon.net> Wed, 17 July 2019 18:34 UTC

Return-Path: <list-add@dragon.net>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 78C5E120923 for <add@ietfa.amsl.com>; Wed, 17 Jul 2019 11:34:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5d1nh9vTKfiO for <add@ietfa.amsl.com>; Wed, 17 Jul 2019 11:34:10 -0700 (PDT)
Received: from mail.dragon.net (mail.dragon.net [IPv6:2001:4f8:3:36::235]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 319E91208D0 for <add@ietf.org>; Wed, 17 Jul 2019 11:34:10 -0700 (PDT)
Received: from fafnir.remote.dragon.net (localhost [IPv6:::1]) by mail.dragon.net (Postfix) with ESMTP id DFFE1374009B; Wed, 17 Jul 2019 11:34:09 -0700 (PDT)
Received: by fafnir.remote.dragon.net (Postfix, from userid 501) id 5DCFF1578536; Wed, 17 Jul 2019 12:34:09 -0600 (MDT)
Received: from fafnir.local (localhost [127.0.0.1]) by fafnir.remote.dragon.net (Postfix) with ESMTP id 571A31578535; Wed, 17 Jul 2019 12:34:09 -0600 (MDT)
From: Paul Ebersman <list-add@dragon.net>
To: Evan Hunt <each@isc.org>
cc: add@ietf.org
In-reply-to: <20190717182544.GA39700@isc.org>
References: <CAChr6SzSkVU5xbh0sZCCEgd7BUdr-dMorNq=5iMkWp66k8PVow@mail.gmail.com> <15205609-8203-4C6F-9DE7-14D492873C51@rfc1035.com> <CAChr6Syf_=3__jcv6D7b1JokGFYpFuy9y9419V0nCAx=MMh24A@mail.gmail.com> <1513817825.9983.1563350802523@appsuite-gw1.open-xchange.com> <CA+9kkMAdGF_U-syxtFVz-MfBfv-GF_CFouvuUhqcSH96-=Hkjg@mail.gmail.com> <ABBFB472-DC7C-48E2-999E-C364BFD3260E@open-xchange.com> <CA+9kkMBO3LAhVmC+PzBoO7V5vzrfeYyrEPdq6s5nRBrYniqaNA@mail.gmail.com> <CAFWeb9LFnWvo_Y2A1JUKZw2JidD7w1nZsAjLVE85pKqnB46YYA@mail.gmail.com> <B134E7B1-0544-4886-AEAA-8B2390DAABFE@open-xchange.com> <CAFWeb9+nn3aR+=WrypVKxGXzxs1ezZpi8Ei2gm5_CMtJAp5c0w@mail.gmail.com> <20190717182544.GA39700@isc.org>
Comments: In-reply-to Evan Hunt <each@isc.org> message dated "Wed, 17 Jul 2019 18:25:45 -0000."
X-Mailer: MH-E 7.4.2; nmh 1.7.1; XEmacs 21.4 (patch 22)
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-ID: <65549.1563388449.1@fafnir.local>
Date: Wed, 17 Jul 2019 12:34:09 -0600
Message-Id: <20190717183409.5DCFF1578536@fafnir.remote.dragon.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/tKPoVk3cJh7JTgnbenkmTVab9pI>
Subject: Re: [Add] [EXTERNAL] Re: draft-grover-add-policy-detection-00
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Jul 2019 18:34:14 -0000

each> But I'm not sure why we get hung up on parental filtering per se.
each> My worries are about botnet C&C and data exfiltration, and that's
each> an issue that applies to every network, with or without kids, and
each> probably more to businesses and governments than to families.

Indeed. We seem to be spinning. Can we agree that:

  - there are multiple use cases where end users (or their employer)
    want to have and control DNS filtering
  - some of these use cases are not enterprises with an IT
    infrastructure that can do things like group policy, control of user
    apps, etc.

If that's the case, we either need solutions or verbage explaining how
close to this we can get and what won't be technically possible.