Re: [Add] ADD Requirements Draft

Eric Rescorla <ekr@rtfm.com> Tue, 01 September 2020 16:47 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: add@ietfa.amsl.com
Delivered-To: add@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DCE33A09F6 for <add@ietfa.amsl.com>; Tue, 1 Sep 2020 09:47:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AsS43zmR-cVZ for <add@ietfa.amsl.com>; Tue, 1 Sep 2020 09:46:59 -0700 (PDT)
Received: from mail-lj1-x235.google.com (mail-lj1-x235.google.com [IPv6:2a00:1450:4864:20::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 679FC3A09F7 for <add@ietf.org>; Tue, 1 Sep 2020 09:46:59 -0700 (PDT)
Received: by mail-lj1-x235.google.com with SMTP id w14so2370183ljj.4 for <add@ietf.org>; Tue, 01 Sep 2020 09:46:59 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=sBDgrOIHPm3mhl6/9jP1srBhYsOGaGDNA4C+Y0fA5rw=; b=R1g7Zdcp0ogJoYbyu1lhYgqXMd641Eu8FPnSBkymFaPdibzVBB3ZExWnH1+LX9XHob iROqOLBfxwzEKItSicoHsVsXbMkO1E2icg20xy3dKEM7snP06F5fnReCvbBDWRw+R7o2 iYFvo3NV8byCeyi8A0LKo1SWnZwWfb8aloPtUwMGk0QRbtBjPN12kCaPs9WrDYVxDk+Q JsbGQuHED5mltwYNdcE9p7X7/xdMqVa+zLb45/xvpvWjj9+6SWN83UVzX/bFnmrL7SXR Lgb4fQ6eykvmnCWKeBLEdfGjYaKBGz+WOze3qQZy6/zrJQqw+1OM9ypYp0qlnPgEFU70 MtuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=sBDgrOIHPm3mhl6/9jP1srBhYsOGaGDNA4C+Y0fA5rw=; b=H/r6kvBRGJc0Qlr2M5CrdbW8aLReoNvmX1QILnb6alPlYuPeIa0nv5JJcCJEBg40ZK jrKw7lkhB9tIwzZcS6zVgSYyxDJWJmVJRGOMmfu2gSm92y11BQCjPz0YfwpSHFU+A2rY G6Gmv2PsvXKOVdlUoXM2thx1qOMcOyLakNQrheKg/oFLVM/4IAcG/AGXCMhyexeWzQr8 c86joPKtJHZVikQK6DRhGo+y3jYrXYZVRo19oMoAerp6IkEK4nrsvlU189P/rMf4oD8r glawDZUfbvuuu4OzqtOQvLmSO7w6bp6EBfmBFr3UA/QYj3ylF8cvoFMsp8zGOH8JPoiA Ri1w==
X-Gm-Message-State: AOAM533KR3tkoWD21LPuwo8YehfBZwpF59JvaWraLmiFilMXWk75sijr DFt5/0sVxWlTkAqBXxH9AZHYfibZmvoh+ftm5ewOoA==
X-Google-Smtp-Source: ABdhPJxHDxh/EP/A0/Mb9cWvgoBbR5GgtEUBqo8xze9uLKI1zixVQ1+vrgu6PIaTi9dGGCgnlElNMsRv4vG3Jhy30S0=
X-Received: by 2002:a2e:2c17:: with SMTP id s23mr1109698ljs.265.1598978817354; Tue, 01 Sep 2020 09:46:57 -0700 (PDT)
MIME-Version: 1.0
References: <31194C90-6C0B-470C-8B14-79C12D2C5C0D@comcast.com> <CACJ6M14gXmEHc_fX8=GpKwRDn6C=R7LR06JG_Qg-cWR5agU9Hw@mail.gmail.com> <391E15D2-9208-4BA9-B01E-3673982DA6CE@apple.com> <CABcZeBMXvcF6PJWE+EkGVx1c9RXzO1XuB3xhrVKUJvUb=aus8A@mail.gmail.com> <4cd8a8c6-3516-4ad6-877c-9460d8096773@www.fastmail.com> <CAFpG3gfkrKGiuPRH1QvH+-w2H=N1ijtDpk5Oh=D2JOp-L4Q1+w@mail.gmail.com> <CABcZeBNhHcNAkVm=PNUvV8_vGVvDvJbaMVHB_w9zu63+ebQwpQ@mail.gmail.com> <CAFpG3gcAjHkh7boDwLq+sHpGtfB2WT0NbuuFqqBQs2M6BZkAOQ@mail.gmail.com> <CABcZeBMi-B7LKB6ipt6vLSZcF9OMLga8f+qydpZVOhOGQrttuQ@mail.gmail.com> <CAFpG3geQefT0=fN-6UFwDqLLqbb1XthHA=np4HPS2NfSO77csA@mail.gmail.com> <CABcZeBPmfe8Um38xFHoxw+26-YQxFUPN+p4aW9uzbPKGy1xz4g@mail.gmail.com> <CAFpG3gefyTcibzfQ-dzXKv5fKE=vwUktux0dz25wNL7_+tf7MA@mail.gmail.com>
In-Reply-To: <CAFpG3gefyTcibzfQ-dzXKv5fKE=vwUktux0dz25wNL7_+tf7MA@mail.gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 01 Sep 2020 09:46:20 -0700
Message-ID: <CABcZeBMVcH74RYXZrLRNtHLi-xZgGxRHA2CsH6nbiz+5uGM32g@mail.gmail.com>
To: tirumal reddy <kondtir@gmail.com>
Cc: Christopher Wood <caw@heapingbits.net>, ADD Mailing list <add@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000069851805ae43441d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/add/zrRlL-XY-djTGWGUQFb3VFf4f8A>
Subject: Re: [Add] ADD Requirements Draft
X-BeenThere: add@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Applications Doing DNS <add.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/add>, <mailto:add-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/add/>
List-Post: <mailto:add@ietf.org>
List-Help: <mailto:add-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/add>, <mailto:add-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Sep 2020 16:47:02 -0000

On Tue, Sep 1, 2020 at 4:10 AM tirumal reddy <kondtir@gmail.com> wrote:

> Hi Eric,
>
> Please see inline
>
> On Fri, 28 Aug 2020 at 19:08, Eric Rescorla <ekr@rtfm.com> wrote:
>
>>
>>
>> On Fri, Aug 28, 2020 at 12:35 AM tirumal reddy <kondtir@gmail.com> wrote:
>>
>>> On Thu, 27 Aug 2020 at 18:46, Eric Rescorla <ekr@rtfm.com> wrote:
>>>
>>>>
>>>>
>>>> On Wed, Aug 26, 2020 at 10:15 PM tirumal reddy <kondtir@gmail.com>
>>>> wrote:
>>>>
>>>>> Hi Eric,
>>>>>
>>>>> Please see inline
>>>>>
>>>>> On Wed, 26 Aug 2020 at 16:50, Eric Rescorla <ekr@rtfm.com> wrote:
>>>>>
>>>>>>
>>>>>>
>>>>>> As I said when you first proposed this in an ADD meeting, I do not
>> believe that anything of this kind is viable.
>>
>
>> 1. Certificates tied to a legal entity have not been effective, which is
>> why browsers are removing EV.
>>
>
> The draft does not propose using EV certificates for encrypted DNS
> servers, please see
> https://tools.ietf.org/html/draft-reddy-add-server-policy-selection-05#section-4 for
> more details.
>

It proposes something similar, which I expect to have the same drawbacks.


2. There is ample evidence that users do not read privacy policies.
>>
>
> The DNS server privacy statement is much more simpler compared to a
> typical privacy statement by a
> content service provider (see
> https://tools.ietf.org/html/draft-ietf-dprive-bcp-op-14#section-6).
>

I don't think that makes it significantly more likely that people will read
it.


Further, automated analysis of a privacy statement is possible using deep
> learning (https://pribot.org/files/Polisis_USENIX_Security_Paper.pdf).
> You can explore polisis and pritbot at https://pribot.org to explore the
> analysis of privacy statements by several organizations..
>

I took a quick look at this tool and while it appears to be interesting
work, it does not produce output which I think is likely for users to
actually assimilate. For instance here is what it does with McAfee's policy:
https://pribot.org/polisis/?company_url=mcafee.com&_id=59d8f9c4e3dd0c4e24555c1d&category=first-party-collection-use

We've already run this experiment of machine readable privacy policies once
with P3P and I don't see a reason to think this will be any different

Taking a step back here: is there any client with significant usage that
would be interested in consuming this kind of policy when published by a
resolver? If so, I'd like to hear from them about their needs. If not, it
doesn't seem worth discussing further.

-Ekr