Re: [dns-privacy] WG Call for Adoption: draft-pauly-dprive-oblivious-doh

Tommy Pauly <tpauly@apple.com> Thu, 18 March 2021 17:13 UTC

Return-Path: <tpauly@apple.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E3BA3A2FFC; Thu, 18 Mar 2021 10:13:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.367
X-Spam-Level:
X-Spam-Status: No, score=-2.367 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.248, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YxDC1quDYqGo; Thu, 18 Mar 2021 10:13:26 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp01.apple.com (ma1-aaemail-dr-lapp01.apple.com [17.171.2.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 75AB53A2FFB; Thu, 18 Mar 2021 10:13:26 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp01.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp01.apple.com (8.16.0.42/8.16.0.42) with SMTP id 12IH2siv016876; Thu, 18 Mar 2021 10:13:25 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=GC6xs891ecEcjEEtku+0mDtzMB1JObXXdDZwkp4qKCU=; b=J/eC4e07HFDYS4a4HakaLw7wYYaKHNiLMVL4h/yuCe3RQcRzkdi1xmxnuyipN7zJJsQ9 z8Y7ZgdDpccM8yfauck+r/qmYRpwD27wu6+9pFt4VnjU1QmK8ZKt8iXTe4AxI7DX1u/6 6q5dW8Wky19hu/aLmxBgoB66JUx01taHos0DctM68hAFoNe7LIj7JYfTqoJ6fJDvov/Y YfU4Z/k4ZSDJ/oTZKjgWZRTLiF16bKOQjcCdCr5JK23+Ru1/+IR4weBcjZYZoNhI2iw9 LbT2brLnebuBadTVUPutUE9QUC0VneX2ngsY/ZcVvjhjqPlj4+S+5fAgNDOaf7AT8XVR gw==
Received: from rn-mailsvcp-mta-lapp02.rno.apple.com (rn-mailsvcp-mta-lapp02.rno.apple.com [10.225.203.150]) by ma1-aaemail-dr-lapp01.apple.com with ESMTP id 378vx7s4k1-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 18 Mar 2021 10:13:25 -0700
Received: from rn-mailsvcp-mmp-lapp02.rno.apple.com (rn-mailsvcp-mmp-lapp02.rno.apple.com [17.179.253.15]) by rn-mailsvcp-mta-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3 2020)) with ESMTPS id <0QQ600Y5ID6CDP90@rn-mailsvcp-mta-lapp02.rno.apple.com>; Thu, 18 Mar 2021 10:13:24 -0700 (PDT)
Received: from process_milters-daemon.rn-mailsvcp-mmp-lapp02.rno.apple.com by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3 2020)) id <0QQ600600CXKLJ00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Thu, 18 Mar 2021 10:13:24 -0700 (PDT)
X-V-A:
X-V-T-CD: dd7269c49f48ec91b1249f385c7ea2dc
X-V-E-CD: 3d3b98d69736d817fbb5aae8c947400e
X-V-R-CD: ee0cb8296ef15b064f81f9f2243816ef
X-V-CD: 0
X-V-ID: 79c114a4-b9e3-4e35-b8db-a3fe1730cbd0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-18_09:2021-03-17, 2021-03-18 signatures=0
Received: from smtpclient.apple (unknown [17.234.31.74]) by rn-mailsvcp-mmp-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3 2020)) with ESMTPSA id <0QQ600M15D6BIR00@rn-mailsvcp-mmp-lapp02.rno.apple.com>; Thu, 18 Mar 2021 10:13:24 -0700 (PDT)
From: Tommy Pauly <tpauly@apple.com>
Message-id: <68D476A8-6AA8-4FD2-ADF4-01DAF428F99D@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_51340EAE-F8CF-4373-AF66-FBBB3CC8E4C1"
MIME-version: 1.0 (Mac OS X Mail 15.0 \(3668.0.5\))
Date: Thu, 18 Mar 2021 10:13:23 -0700
In-reply-to: <CAMOjQcHZVQZhOs-U9TGpRTk-Agsv3eLCf_BNL2ZxDZwRtgs1=w@mail.gmail.com>
Cc: Jim Reid <jim@rfc1035.com>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>
To: Eric Orth <ericorth=40google.com@dmarc.ietf.org>
References: <1a1ef163-bef8-0726-8e51-e444e8fe6091@innovationslab.net> <86e54685-ab6e-83b5-e4f6-bbd71fc6dd5a@nic.cz> <CABcZeBOgE=ABFwErsYFrjSRWFXgcJp_JncVXbwcaiDf3iFs7RA@mail.gmail.com> <AF91913A-42A1-4832-8113-F576C4AA4684@apple.com> <6E546D21-9B96-42DA-A488-4BC0E8E7A4AB@rfc1035.com> <CAMOjQcE7WeB1ijYdjmb39yt2szJvW3wc8kfDNc6chF7S51=+qQ@mail.gmail.com> <A6D5870D-C944-4BDE-A7A3-87E6E17D27D8@rfc1035.com> <CAMOjQcHZVQZhOs-U9TGpRTk-Agsv3eLCf_BNL2ZxDZwRtgs1=w@mail.gmail.com>
X-Mailer: Apple Mail (2.3668.0.5)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369, 18.0.761 definitions=2021-03-18_09:2021-03-17, 2021-03-18 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/O9YnVoUisKZaHm-pbUk4fJ6vACk>
Subject: Re: [dns-privacy] WG Call for Adoption: draft-pauly-dprive-oblivious-doh
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 18 Mar 2021 17:13:28 -0000


> On Mar 18, 2021, at 9:40 AM, Eric Orth <ericorth=40google.com@dmarc.ietf.org> wrote:
> 
> 
> 
> On Thu, Mar 18, 2021 at 12:33 PM Jim Reid <jim@rfc1035.com <mailto:jim@rfc1035.com>> wrote:
> 
> 
> > On 18 Mar 2021, at 16:21, Eric Orth <ericorth=40google.com@dmarc.ietf.org <mailto:40google.com@dmarc.ietf.org>> wrote:
> > 
> > I disagree with your assumption that clients/users are only concerned about particular resolvers. 
> 
> Eric, I didn’t make any assumptions about that at all. It was Tommy who said ODNS would benefit those who were concerned about leakage to very large public resolvers. All I did was suggest a simpler alternative that wouldn’t need an RFC or the introduction of more complexity and lots more moving parts.
> Ah, thanks for the explanation.  Maybe Tommy can further explain his point?
>  
> 
> If the aim of ODNS is to prevent leakage to resolvers *in general*, then that’s a different story. But as I said the use case and problem statement isn’t (yet) compelling enough. The cost/benefit analysis is unclear too. YMMV.
> Preventing leakage to resolvers *in general* would be exactly my interest in ODoH.  This goes along with my previous statement that I think clients could find good use in automatically using ODoH (for either particularly-sensitive or all queries) as an autoupgrade to known-supporting providers rather than just being something users explicitly select when they have particular concerns.

To clarify my point earlier, I was mainly replying to the concern that supporting ODoH would be a burden for resolvers to implement. Although I don’t think it’s actually that much complexity to add, given our experience, I don’t see a deployment scenario where all recursive resolvers would offer oblivious resolution.

Mainly, this is relevant for resolvers that directly receive client-generated queries, are not directly on the local network (and thus already know a lot about the user), and are in a position where a client can use a proxy to access them. Large public resolvers do fall into this category, but it isn’t limited. It could also be the resolvers used for ISPs, carriers, etc.

Thanks,
Tommy

>  
> 
> 
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org <mailto:dns-privacy@ietf.org>
> https://www.ietf.org/mailman/listinfo/dns-privacy <https://www.ietf.org/mailman/listinfo/dns-privacy>
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy