Re: [dns-privacy] WG Call for Adoption: draft-pauly-dprive-oblivious-doh
Stephen Farrell <stephen.farrell@cs.tcd.ie> Fri, 19 March 2021 01:03 UTC
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D37F3A1110 for <dns-privacy@ietfa.amsl.com>; Thu, 18 Mar 2021 18:03:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LFyYr1qig5dI for <dns-privacy@ietfa.amsl.com>; Thu, 18 Mar 2021 18:03:48 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20B793A110F for <dns-privacy@ietf.org>; Thu, 18 Mar 2021 18:03:47 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id D0AB4BE2C; Fri, 19 Mar 2021 01:03:42 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Z7SpfGT4kSY; Fri, 19 Mar 2021 01:03:40 +0000 (GMT)
Received: from [10.244.2.119] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 8BC46BE1C; Fri, 19 Mar 2021 01:03:40 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1616115820; bh=TVRFKtTRU3YaO8iWMW61/AwgRqSXV+qzW7DuLhafSBE=; h=To:References:From:Subject:Date:In-Reply-To:From; b=lqBhLxa10BxGx8WAEeygOdsxhhxQTcQiUHLE/dzJwtF+yssPvdRN0+V2FwfFNYL38 +8dt5vpFc4wIGCEX63LhGegLv2veuXEltJkT2265wreyIBGKw9ujliYm2rvZkFwkFt It8qMOuvgjbA8+pVAATYuWHT9LHZG3RQvhEZ03+8=
To: Brian Haberman <brian@innovationslab.net>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>
References: <1a1ef163-bef8-0726-8e51-e444e8fe6091@innovationslab.net>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <f467f020-e8e2-226b-e76a-d7cb849924b1@cs.tcd.ie>
Date: Fri, 19 Mar 2021 01:03:39 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
MIME-Version: 1.0
In-Reply-To: <1a1ef163-bef8-0726-8e51-e444e8fe6091@innovationslab.net>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="nqIev212hYD5MZOEjnTzBpUoDgZqX0Hkc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/1xHZ7jZPDYu29P4mVfetgxs6PqM>
Subject: Re: [dns-privacy] WG Call for Adoption: draft-pauly-dprive-oblivious-doh
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Mar 2021 01:03:51 -0000
Hiya, I had a pretty quick read of this. I haven't followed this discussion in detail though, so am not claiming to be that well informed. I'm not that convinced by it tbh - it seems that running DNS/Tor is quite doable for at least some clients so it may well be that it'd be as or more valuable to explore how to make that work better, and/or to compare this design vs. DNS/Tor or other designs in various scenarios before adopting something like this. (In full-disclosure mode: I think it'd be great if we managed to figure a way to include Tor in our standards, if we can do that without distracting the Tor people too much, and maybe DNS/Tor could be a tractable option there, so I have a bit of a bias towards exploring that design, but without being willing to devote the effort required myself, so that's both a bias and me being a hurler-on-the-ditch [1]:-) The apparently impending work on oblivious HTTP is also a negative here, for me, due to the danger of duplication of scarce effort. There's also lots of scope for (O)DoX confusion if we do this now. Publishing this via the ISE and running experiments, then bringing those results to the WG may be a good way to proceed, should the proponents want to do that. Or maybe experimenting on this in PEARG could be a better route. I do like the idea of improving DNS privacy by making it harder to track a single client's queries though, so I'm not totally against this by any means. On the draft itself: - I'm not clear as to the overall efficacy of the approach, given deployment realities - it may make more sense to first adopt a work item to explore the design space of proxied DNS (or some form of gossip as another commenter noted) before adopting a specific solution as a WG draft. The draft itself quite reasonably points out that it's early days for this work, so I'm not sure if we'd be better to adopt a design now or to wait some, but I suspect "wait some" is the better conclusion for now. - The danger of things like XFF/Forwarded seems real, should this get widely deployed. I wondered if a scheme where the entire proxy->target HTTP request (or similar octets) are embedded into the target's encryption could allow a client to detect that a proxy is not sending only the expected HTTP headers etc. That'd likely require some form of "test query" be sent to multiple targets via the same proxy, with perhaps one of the targets being the client itself. The idea would be to try detect cheating proxies. I'm sure that's naive in various ways, but again for me that argues for adopting a work-item to explore a bigger design space than just this draft may be right. (And apologies in advance if my quick scan of the draft missed a discussion of such ideas.) Lastly, typing all the above has nearly convinced me that the right outcome here is probably: GOTO PEARG. Cheers, S. [1] https://idioms.thefreedictionary.com/hurler+on+the+ditch
- [dns-privacy] WG Call for Adoption: draft-pauly-d… Brian Haberman
- Re: [dns-privacy] [Ext] WG Call for Adoption: dra… Eric Orth
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Eric Rescorla
- Re: [dns-privacy] [Ext] WG Call for Adoption: dra… Paul Hoffman
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Martin Thomson
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Eric Rescorla
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Rob Sayre
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Martin Thomson
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Tommy Pauly
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Watson Ladd
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Petr Špaček
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Tomas Krizek
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Ondřej Surý
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Neil Cook
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Paul Wouters
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Eric Rescorla
- Re: [dns-privacy] [Ext] WG Call for Adoption: dra… Paul Hoffman
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Tommy Pauly
- Re: [dns-privacy] [Ext] WG Call for Adoption: dra… Tommy Pauly
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Jim Reid
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Tomas Krizek
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Eric Orth
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Jim Reid
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Eric Orth
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Tommy Pauly
- Re: [dns-privacy] [Ext] WG Call for Adoption: dra… Paul Hoffman
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Neil Cook
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Christopher Wood
- Re: [dns-privacy] WG Call for Adoption: draft-pau… David Schinazi
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Stephen Farrell
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Rob Sayre
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Peter van Dijk
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Wes Hardaker
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Rob Sayre
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Vladimír Čunát
- Re: [dns-privacy] WG Call for Adoption: draft-pau… Brian Haberman