Re: [dns-privacy] Datatracker State Update Notice: <draft-ietf-dprive-rfc7626-bis-04.txt>

Vittorio Bertola <vittorio.bertola@open-xchange.com> Tue, 12 May 2020 12:14 UTC

Return-Path: <vittorio.bertola@open-xchange.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47A393A07BD; Tue, 12 May 2020 05:14:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=open-xchange.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eIAamOnmrQgt; Tue, 12 May 2020 05:14:52 -0700 (PDT)
Received: from mx3.open-xchange.com (alcatraz.open-xchange.com [87.191.39.187]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BE673A07BC; Tue, 12 May 2020 05:14:46 -0700 (PDT)
Received: from open-xchange.com (imap.open-xchange.com [10.20.30.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx3.open-xchange.com (Postfix) with ESMTPS id 865396A2CF; Tue, 12 May 2020 14:14:44 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=open-xchange.com; s=201705; t=1589285684; bh=kRDYdDoi78txfccjOIyzPSYolSz30XW+rmhPazpW8lI=; h=Date:From:To:Cc:In-Reply-To:References:Subject:From; b=Zbr9xrdI68z/37lV5Gg3mURsQJuetqZryIskq53QYQfpkSZszxnjgwvgxFniQj4Ko CbP4MBFV1OXUHxzPV6yZ6hDKiUf4U/oYLyN1o3bmCn3jkksyW6IyhHKmOJ2fKAa+CM OVpqXn4v0nydvtQ4HO/QeYM1vYY2ihQBIx64HcqfLpNUNRWm0dbpi9ukrGvsc8odp8 N9HRie8vl0TbbOkL07UD/IV8pfJV7e3yze+cV4qvIQMSVgScrzIuhIdr6vIzpf2qy/ Dv9kZe+S36wfp7KK/AwUzSJQrWNQPlfSvvwB/LNJ/IkFkTiTdEGPv3u+AJhHnF9wJC DY84gfmqPACjw==
Received: from appsuite-gw2.open-xchange.com (appsuite-gw2.open-xchange.com [10.20.28.82]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by open-xchange.com (Postfix) with ESMTPSA id 75B6D3C0432; Tue, 12 May 2020 14:14:44 +0200 (CEST)
Date: Tue, 12 May 2020 14:14:43 +0200
From: Vittorio Bertola <vittorio.bertola@open-xchange.com>
To: Christian Huitema <huitema@huitema.net>
Cc: "dns-privacy@ietf.org" <dns-privacy@ietf.org>, "draft-ietf-dprive-rfc7626-bis@ietf.org" <draft-ietf-dprive-rfc7626-bis@ietf.org>, "dprive-chairs@ietf.org" <dprive-chairs@ietf.org>
Message-ID: <541315765.30668.1589285684382@appsuite-gw2.open-xchange.com>
In-Reply-To: <4fc44293-cdd9-24b7-cf26-1451a3652f73@huitema.net>
References: <157955609351.1744.15099511006231348523.idtracker@ietfa.amsl.com> <F6C06842-9D76-45DF-84A0-B0C4D724E66E@sinodun.com> <CABcZeBPVocy593=WJM2k3Ytrwg36qc_1d4VQH3otRM5qyvZwLA@mail.gmail.com> <1388052392.1781.1586274052101@appsuite-gw1.open-xchange.com> <CABcZeBNi2LKvGFcmTM0uC+rFEVm5tgw6Zo1LS_CoO5=Zo0zqSA@mail.gmail.com> <C03AC6C2-9DCB-448A-B906-3062BD616E31@sinodun.com> <CAMOjQcGrWXFpStp=iVbo1jVN3qnen8rC71SyXv6evY2-MgUdxg@mail.gmail.com> <3345FB83-A19A-4542-8A8E-C535884B157F@sinodun.com> <CABcZeBPP6J=a=hW6BLcMnKawupa3RjjpYAzgZ317=ryLy39n+A@mail.gmail.com> <8CEFE3CB-A88C-4BBC-95B8-9850142DB5EE@sinodun.com> <CABcZeBPF41eq-HYXdYScx7bqYyUO7-oH6zWKqj7Ka23u8x_E4A@mail.gmail.com> <ACA9854E-00B7-4776-A850-E5069C672121@cisco.com> <CABcZeBOxN7iNTLFUw7JDc4ZGH_u4awys3g52de29CuOyQv2JUQ@mail.gmail.com> <C8B168D0-F719-405F-892F-14573A7C568D@sinodun.com> <CABcZeBPGAgqSPKWXKaL6kK5CYzgK+RmwFrMwhc6ED7aGnV_ayA@mail.gmail.com> <8AB227E2-F968-47C4-9EB6-40A988263892@sinodun.com> <4fc44293-cdd9-24b7-cf26-1451a3652f73@huitema.net>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_Part_30666_1564096636.1589285684364"
X-Priority: 3
Importance: Normal
X-Mailer: Open-Xchange Mailer v7.10.3-Rev8
X-Originating-Client: open-xchange-appsuite
Autocrypt: addr=vittorio.bertola@open-xchange.com; prefer-encrypt=mutual; keydata= mQENBFhFR+UBCACfoywFKBRfzasiiR9/6dwY36eLePXcdScumDMR8qoXvRS55QYDjp5bs+yMq41qWV9 xp/cqryY9jnvHbeF3TsE5yEazpD1dleRbkpElUBpPwXqkrSP8uXO9KkS9KoX6gdml6M4L+F82WpqYC1 uTzOE6HPmhmQ4cGSgoia2jolxAhRpzoYN99/BwpvoZeTSLP5K6yPlMPYkMev/uZlAkMMhelli9IN6yA yxcC0AeHSnOAcNKUr13yXyMlTyi1cdMJ4sk88zIbefxwg3PAtYjkz3wgvP96cNVwAgSt4+j/ZuVaENP pgVuM512m051j9SlspWDHtzrci5pBKKFsibnTelrABEBAAG0NUJlcnRvbGEsIFZpdHRvcmlvIDx2aXR 0b3Jpby5iZXJ0b2xhQG9wZW4teGNoYW5nZS5jb20+iQFABBMBAgAqBAsJCAcGFQoJCAsCBRYCAwEAAp 4BAhsDBYkSzAMABQMAAAAABYJYRUflAAoJEIU2cHmzj8qNaG0H/ROY+suCP86hoN+9RIV66Ej8b3sb8 UgwFJOJMupZfeb9yTIJwE4VQT5lTt146CcJJ5jvxD6FZn1Htw9y4/45pPAF7xLE066jg3OqRvzeWRZ3 IDUfJJIiM5YGk1xWxDqppSwhnKcMOuI72iioWxX0nGQrWxpnWJsjt08IEEwuYucDkul1PHsrLJbTd58 fiMKLVwag+IE1SPHOwkPF6arZQZIfB5ThtOZV+36Jn8Hok9XfeXWBVyPkiWCQYVX39QsIbr0JNR9kQy 4g2ZFexOcTe8Jo12jPRL7V8OqStdDes3cje9lWFLnX05nrfLuE0l0JKWEg8akN+McFXc+oV68h7nu5A Q0EWEVH5QEIAIDKanNBe1uRfk8AjLirflZO291VNkOAeUu+dIhecGnZeQW6htlDinlYOnXhtsY1mK9W PUu+xshDq7lXn2G0LxldYwyJYZaJtDgIKqVqwxfA34Lj27oqPuXwcvGhdCgt0SW/YcalRdAi0/AzUCu 5GSaj2kaGUSnBYYUP4szGJXjaK2psP5toQSCtx2pfSXQ6MaqPK9Zzy+D5xc6VWQRp/iRImodAcPf8fg JJvRyJ8Jla3lKWyvBBzJDg6MOf6Fts78bJSt23X0uPp93g7GgbYkuRMnFI4RGoTVkxjD/HBEJ0CNg22 hoHJondhmKnZVrHEluFuSnW0wBEIYomcPSPB+cAEQEAAYkBMQQYAQIAGwUCWEVH5QIbDAQLCQgHBhUK CQgLAgUJEswDAAAKCRCFNnB5s4/KjdO8B/wNpvWtOpLdotR/Xh4fu08Fd63nnNfbIGIETWsVi0Sbr8i E5duuGaaWIcMmUvgKe/BM0Fpj9X01Zjm90uoPrlVVuQWrf+vFlbalUYVZr51gl5UyUFHk+iAZCAA0WB rsmACKvuV1P7GuiX3UV9b59T9taYJxN3dNFuftrEuvsqHimFtlekUjUwoCekTJdncFusBhwz2OrKhHr WWrEsXkfh0+pURWYAlKlTxvXuI7gAfHEQM+6OnrWvXYtlhd0M1sBPnCjbyG63Qws7Rek9bEWKtH6dA6 dmT2FQT+g1S9Mdf0WkPTQNX0x24dm8IoHuD3KYwX7Svx43Xa17aZnXqUjtj1
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/QkHppBHBcuLHrk3Q-Sgsgqdl1Fw>
Subject: Re: [dns-privacy] Datatracker State Update Notice: <draft-ietf-dprive-rfc7626-bis-04.txt>
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 May 2020 12:14:54 -0000

>     Il 11/05/2020 21:35 Christian Huitema <huitema@huitema.net> ha scritto:
> 
> 
>     I found the discussion of application embedded resolvers bizarre. It speaks of applications in general, but the way the text is set-up appears to be a specific dig against Mozilla. Look at the text: "popular applications directing DNS traffic by default to specific dominant resolvers". It boils down to accusing some unnamed application of deliberately contributing to centralization. I find that problematic, and also very imprecise. I think this should be rewritten in a much more neutral way.
> 
I think this section has already been rewritten at least half a dozen times, and every time there was a claim that it is not neutral (sometimes even on text that previously seemed to be ok). Every time the authors put the effort to rewrite it once again according to the comment, and every time a new comment comes in saying that this is not enough. I admire their patience.

In any case, I don't know Mozilla's view on whether this is a specific dig against them, but it is meant as a discussion on privacy impacts of a specific deployment model, not of a specific company's policy. These privacy impacts, even if with very variable views, have been the subject of many conferences, articles and talks in the last couple of years - they were not discovered in this document, and it would be weird if they were omitted from a discussion on DNS privacy released in 2020. The fact that Mozilla is at this time the only company adopting that model is just coincidental, apart from perhaps reflecting the fact that others think that that model is not a particularly good idea.


> 
>     In a modern environment, the concept of host is very fuzzy. We get all kinds of special devices. We also get containers or virtual machines running inside hosts. A browser is in practice such a container. There is not a difference of nature between a separate subsystem like a browser environment and a separate device. If a browser embeds its own stub resolver, users can configure the resolver of their choice in much the same way that they can configure the resolver of their choice using a device configuration UI. There are differences in management, but these differences fall largely outside the scope of the DNS privacy draft.
> 
>     In both cases, users are very likely to configure a well-known service. There is not much the difference between setting the device's preferred resolver to 8.8.8.8 and setting the browser's choice to "Google DNS"? In both cases, the centralization effect results from the popularity of the service, unless you are specifically accusing Mozilla of conspiring to centralize the DNS. And a privacy RFC is not the right place to do that.
> 
You seem to miss the point, which is not about users setting their preferred resolver at the application level, but about applications that by default ignore the resolver settings in the device and pick their own preferred resolver independently from the user.

In a market in which there are few choices, indeed this behaviour promotes centralization: we know that most users do not change the defaults, and if most users of a popular application start using a single resolver in place of a broad set of local resolvers scattered around the Internet, of course the resulting traffic pattern is more centralized.

We also know that centralization of the DNS is potentially a privacy threat, as it makes it easier to track and correlate multiple activities by the same individual. This does not seem contentious - it was actually the first example in last year's IAB "DEDR" workshop charter.

Moreover, this potential downside for privacy can be entirely countered by increased privacy protections offered by the new operator, and this is clearly stated in the final paragraph.

The central paragraphs were initially meant to say that, to preserve the user's privacy, the user should always be given controls to set the resolver. This is in line with the basic principle of most privacy-protecting policy frameworks, i.e. user consent.

However, the current text just says that "if" we wanted to give users the same degree of control they currently have in basically any consumer-oriented operating system, then applications should provide users with controls (any control goes, even if hidden under a 3-click-deep configuration hierarchy, as you have to do today if you really want to reject advertising cookies on the average commercial website). Then, the text adds that if applications don't do it, users might not... be able to control their resolver.

There is not even any more a stance that says that users should be able to choose where their DNS queries go, or that the lack of such choice is in itself a privacy problem. From the perspective of a privacy advocate, this section is now quite watered down.

I am also puzzled by the fact that this draft was actually in last call six months ago, and it only received a single objection just before the deadline, and since then we have entered an endless cycle changing it again and again and again. I did my best to help with compromise text as requested but I do not understand where this process is going.


--

Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
vittorio.bertola@open-xchange.com mailto:vittorio.bertola@open-xchange.com 
Office @ Via Treviso 12, 10144 Torino, Italy