Re: [Add] Fwd: New Version Notification for draft-reddy-dprive-dprive-privacy-policy-00.txt

Paul Wouters <paul@nohats.ca> Thu, 10 October 2019 15:44 UTC

Return-Path: <paul@nohats.ca>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05C25120813 for <add@ietfa.amsl.com>; Thu, 10 Oct 2019 08:44:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level:
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nohats.ca
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CPxppLAal3Ji for <add@ietfa.amsl.com>; Thu, 10 Oct 2019 08:44:54 -0700 (PDT)
Received: from mx.nohats.ca (mx.nohats.ca [IPv6:2a03:6000:1004:1::68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C225E120116 for <add@ietf.org>; Thu, 10 Oct 2019 08:44:53 -0700 (PDT)
Received: from localhost (localhost [IPv6:::1]) by mx.nohats.ca (Postfix) with ESMTP id 46pwPw1H0Yz6j; Thu, 10 Oct 2019 17:44:52 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nohats.ca; s=default; t=1570722292; bh=6ypgE+k+vhjlc50voZnpAa7TiC40WoiPIiJZNk/LiJY=; h=Date:From:To:cc:Subject:In-Reply-To:References; b=nzRpeQJoOHf7P7VZfo6U3eJlI8vcrGv63c7OC1oR5533ScsYh9sOUHKzwvlq7tnF5 Qj/u/PV/NW7QpeyriCsL6fjRdMUI38F7tBiOlY9XU5jtmMn0pm9pWcOSe01SFm7/fM Na8IddAIhv9upYn4EKmX82IcwgmKf8cLRxhsccgQ=
X-Virus-Scanned: amavisd-new at mx.nohats.ca
Received: from mx.nohats.ca ([IPv6:::1]) by localhost (mx.nohats.ca [IPv6:::1]) (amavisd-new, port 10024) with ESMTP id 1J0E0fJSMopf; Thu, 10 Oct 2019 17:44:49 +0200 (CEST)
Received: from bofh.nohats.ca (bofh.nohats.ca [76.10.157.69]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx.nohats.ca (Postfix) with ESMTPS; Thu, 10 Oct 2019 17:44:49 +0200 (CEST)
Received: by bofh.nohats.ca (Postfix, from userid 1000) id DE2F8606AA24; Thu, 10 Oct 2019 11:44:47 -0400 (EDT)
Received: from localhost (localhost [127.0.0.1]) by bofh.nohats.ca (Postfix) with ESMTP id DA51723FDDC; Thu, 10 Oct 2019 11:44:47 -0400 (EDT)
Date: Thu, 10 Oct 2019 11:44:47 -0400
From: Paul Wouters <paul@nohats.ca>
To: tirumal reddy <kondtir@gmail.com>
cc: ADD Mailing list <add@ietf.org>
In-Reply-To: <CAFpG3gesT5jnCgjUaSH0KFVTNGFsVPo8D5tcgwnF1Y+u6ShQ4w@mail.gmail.com>
Message-ID: <alpine.LRH.2.21.1910101120100.20326@bofh.nohats.ca>
References: <157009854908.16293.4269133049514081713.idtracker@ietfa.amsl.com> <CAFpG3gdpYASvfz_ey=fsh6+8LQ11EJGyU-dVxH7_1QmVeiAQKg@mail.gmail.com> <alpine.LRH.2.21.1910051351420.26913@bofh.nohats.ca> <CAFpG3gfLLkdZt-b+r=8RY8a+yoJx2tzQOevnOLkNQSm9g9QuDw@mail.gmail.com> <alpine.LRH.2.21.1910070925260.8046@bofh.nohats.ca> <CAFpG3ge=zF0W1PzZjc=ysxVzir4tMVa=8ZHs5qyxg4NbE73SPw@mail.gmail.com> <alpine.LRH.2.21.1910090954170.30131@bofh.nohats.ca> <CAFpG3gesT5jnCgjUaSH0KFVTNGFsVPo8D5tcgwnF1Y+u6ShQ4w@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/tLyBn3VYG3Dv6TpdgufgQvFU94A>
Subject: Re: [Add] Fwd: New Version Notification for draft-reddy-dprive-dprive-privacy-policy-00.txt
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Oct 2019 15:45:07 -0000

On Thu, 10 Oct 2019, tirumal reddy wrote:

> I am referring to BYOD devices, BYOD will not have Enterprise root certificate and cannot be provisioned with the
> Enterprise DoT/DoH server using AD. The owner of the the BYOD has a choice whether to use the Enterprise network
> provided DoT/DoH server or not. 

I have a BYOD device. My enterprise insists that they have limited
control via Google Mobile Device Management. They could dictate
to use certain DNS servers when connecting to certain wifi networks.

>       Again, this is fixing a problem that I do not think exists. Why should I
>       trust or not trust this network with DNS to begin with? Their privacy
>       policy update will not change that for me. Either, they were already too
>       weak for me to trust, so I don't care about their DNS privacy policy
>       update, or I trusted them already, in which case it seems I trust them
>       more than my own trusted DNS - AKA I'm forced to trust them (an
>       enterprise network).
> 
> I disagree, user needs to know whether his privacy requirements are met by the local DNS server or public DNS server.

The user cannot know if their privacy requirements are met, with or
without a signed XML statement from those parties. The user can only
hope. And since the user can only hope, it is by far safer to pick
a few or a single trusted party, than to hope each time they connect
to a new wifi network.

> If the public DNS server decides to change the policy to sell user data to third-parties, the user would want to move
> to a different DNS server. 

Sure. But a DNS server that is going to betray the user like that,
wouldn't be stopped by a signed XML file either.

> An end-user cannot audit the privacy claims by any DNS provider including the public DNS revolvers, and can possibility
> rely on the audits performed by third parties (similar to way VPN providers use third party audits).  How does the user
> know the public DNS server has not made false privacy claims ?

The user gains trust through a variety of non-technical, non-protocol
ways. News items, journalism, company reputation, prefering a non-profit
over an advertisetment company, entity history, people they know, etc.
Perhaps even through third party audits similar to mandated CAB/Forum
audits. Why do I not trust Sony or LinkedIn? Because they proved to
not deserve it in the past. Why do I trust cloudflare or PCH? Because
until now, they have proven to commit to their publicly announced
policies on their websites and as reported by other experts.

>       I either have a really good DNS provider that I fully trust up my
>       sleeve, or I don't. If I do, I don't need the local network one.
>       If I don't, I have no choice but the use the local network one.
> 
> Local DNS server for several reasons, blocking malware and phishing

How relevant is this in reality. Linux and OSX people and all mobile
phones do not run anti-malware software. Phising happens mostly via
email, which is unaffected by DoH/DoT and can still be done serverside,
and search engine results - which are curated by both search engines
(google filtering bad stuff) and browsers (eg mozilla preventing me to
go to a known malware site). None of this puts any requirements on my
DNS provider selection.

> , enforce MUD rules to only allow intended
> communications to and from the IoT devices.

non-mobile IoT devices hardly have a use for encrypted DNS to begin
with, and their MUD profiles should not allow it. Those should clearly
state "DNS to DHCP supplied resolver only" and "these domains related to my
services". Note that this isn't secure unless you could trust the DNS
answers, by either local transport or DNSSEC integrity.

> Several other reasons like "CDN endpoint selection" are listed
> in https://tools.ietf.org/html/draft-reid-doh-operator-00

CDN endpoint tracking is pretty risky from a privacy point of view. The
operator might want that, but the user that desires privacy might not.

>       Then why should I ever take a risk that this local network has a privacy
>       policy that does not actually match its implementation?
> 
> Firefox falls back to clear text DNS because the local network has parental control or DNS filtering. Android has an
> option to automatically use to the local DoT server (opportunistic mode). 

Sure, to support the enterprise/parental case voluntarilly. Again, there
is hardly a need to codify this in XML. Their users are forced to
comply. If I am at starbucks, I am not going to let firefox downgrade me
because of "parental control" desire, whether the instructions are XML
signed or not.

>       > Further, it also provides a mechanism to securely signal to the DNS client that the
>       > attached network performs DNS filtering. 
>
>       You cannot signal securely unless I have a trust anchor already on my
>       device that would be used. If this is a CA-type store of hundreds of
>       trust anchors, I cannot really trust them for this decision over a
>       personally selected known safe choice.
> 
> You may want to re-look into the Security and Privacy considerations sections, we are not suggesting to rely on the
> hundreds of trusted anchors on the browser/OS. 

If it is a fundamental design item, it should have its own Section on
how to implement it. Not just waive some Security and Privacy
considerations.

>       If it is enterprise specific,
>       we already have mechanisms in place for securely obtaining updated DNS
>       mechanisms. Like via VPN using RFC 8598.
> 
> No, it is not specific to Enterprise IT manged devices. Managed network security can be provided by ISPs, Home router
> integrated with security service, BYOD policies in Enterprise networks etc. 

ISPs that are not a utility are defacto an enterprise network. Home
routers are parental control or 'enterprise' networks. BYOD devices
already have their methods to enforce various things on their respective
mobile OS platforms requiring no IETF standards. So your cases are still
really enterprise/parental control, where there are tight and mandatory
trust relationships. No signed XML needed.

As I said before, I haven't seen much upside on this. I do see downsides
when this kind of mandatory reconfiguring of my device privacy settings
are being forced at the ISP or national level to circumvent my privacy.
Maybe think of a Human Rights Consideration Section in the document too
as per RFC 8280 ?

Paul