Re: [dns-privacy] [Add] avoiding unnecessary metadata in applications doing DNS / DoH

Ben Schwartz <bemasc@google.com> Thu, 11 April 2019 23:39 UTC

Return-Path: <bemasc@google.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72464120405 for <dns-privacy@ietfa.amsl.com>; Thu, 11 Apr 2019 16:39:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.5
X-Spam-Level:
X-Spam-Status: No, score=-17.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GH5YB-tuWl2b for <dns-privacy@ietfa.amsl.com>; Thu, 11 Apr 2019 16:39:47 -0700 (PDT)
Received: from mail-ua1-x92b.google.com (mail-ua1-x92b.google.com [IPv6:2607:f8b0:4864:20::92b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE1D21203E8 for <dns-privacy@ietf.org>; Thu, 11 Apr 2019 16:39:46 -0700 (PDT)
Received: by mail-ua1-x92b.google.com with SMTP id b8so2636687uaq.7 for <dns-privacy@ietf.org>; Thu, 11 Apr 2019 16:39:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/eEDb+vYT/C8kHkYhunGPeLo0b70bKObMsKOFKlf+I0=; b=SeEoVgBt56tEMG4kdB9TdbRYs+YpvRRZQXjHu+cchqBkireQWgx90YPfWjbjCgylp2 SAAnnsPWAAgC3tgkfET0DdGXDIzjG5eL4xj070xwLY7K+iqTuqr544XdbZqRvx7O6d87 icdzrvv4J6s/dzeqKATVeUnQQ2K/BDQekCGFslbY49ctMv94WwQ6LtteGzHVrG1U0ZPG cihRWbS1PZ7vqevjxkc5iMM6sdzRdrYTfUzwdYkdgeIySrtHEvCdORqgUu2CJjD7HMdJ lyLn3lrGKGt1UcKTKAKZLbxKsS7R5TgpjRvB842NHqTTQEAOSZ48MFtBRHIRmZOjjDn4 uBKQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/eEDb+vYT/C8kHkYhunGPeLo0b70bKObMsKOFKlf+I0=; b=VsxEkQQ0qaksPyYMGgD3GZo+jyuo84IrEN5ICWG2Orabll59Dgk3uKKxvYQzY/2Rm8 dc9DIR44bTnmtP6h8t5YdVfIR/AEh/UiZGX/im0Y7FS6ZXQTPkJWavtACkKjuAPEsACA T4us0zz2rrfHY/orEVU2BsWKyufSNP7oVX45mhniORaH82vumkv8Lve88vByx4sXqxpL DZ2C+7D6ImDx402TtofRBTdilIV2bKpomCJpi8oQfgmQ2TjgX7wTZPqfxaSuvtm11Orw U8tjcavhsAEncOj0KtGRcmF3hXfC+hanZHTUatLNiEjL9Cs03jKtj902VN5d3UlsfhV4 B4wQ==
X-Gm-Message-State: APjAAAWvhW03JGK0U43oMu6JgXwDh9+d1Y51riY7rLybdpvvzsmjcwsG yZ7NH0y/gUmeqtG0h792tglQ68mfMAOllQm4zWFsDw==
X-Google-Smtp-Source: APXvYqze0P0PPr+wHy4uqHvNv+7xI/iPBOWj7+m6/QxunGrWDWpJ9Re9nRphX6gy0/nYfpckCoQGoLOEcuC6PNs1Q5E=
X-Received: by 2002:a9f:2c09:: with SMTP id r9mr26777342uaj.56.1555025985351; Thu, 11 Apr 2019 16:39:45 -0700 (PDT)
MIME-Version: 1.0
References: <fa5035a2-4a7c-ba7b-3835-e6c530c9970b@riseup.net>
In-Reply-To: <fa5035a2-4a7c-ba7b-3835-e6c530c9970b@riseup.net>
From: Ben Schwartz <bemasc@google.com>
Date: Thu, 11 Apr 2019 19:39:34 -0400
Message-ID: <CAHbrMsCqTFW5JPOUG40wyscwp-kQ06zBj9ef3p-wAQMAiKUmOQ@mail.gmail.com>
To: nusenu <nusenu-lists@riseup.net>
Cc: dns-privacy@ietf.org
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-256"; boundary="00000000000083d859058649b3cc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/QyixItnX_33cCvqhgzFtjZJRyc8>
Subject: Re: [dns-privacy] [Add] avoiding unnecessary metadata in applications doing DNS / DoH
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Apr 2019 23:39:49 -0000

Moving thread from ADD to DPRIVE.

I would suggest reaching out to the authors of
https://tools.ietf.org/html/draft-dickinson-doh-dohpe-00 if you're
interested in advancing that line of work.

One major challenge related to User-Agent is forming a workable threat
model.  It seems likely that an interested server could easily identify
distinct user agents, even without this header field.  For example, the TLS
fingerprint alone is sufficient to uniquely identify most TLS
implementations[1], and different HTTP/2 implementations produce different
framing patterns.  Active probing (e.g. returning slightly invalid
responses and observing how the client reacts) would likely allow the
server to identify the client software completely.

It's harder to motivate this kind of protection if it only works against
"friendly" servers, especially because the User-Agent is extremely useful
for server operations, capacity planning, etc.

The DOHPE draft also contains several other suggestions (e.g. removing
locale and language preference information) that may be easier to justify.

[1] https://tlsfingerprint.io/

On Thu, Apr 11, 2019 at 3:12 PM nusenu <nusenu-lists@riseup.net> wrote:

>
> DNS never had something like a user-agent field and that is fine,
> but since browsers send one by default during their (non-DoH) operations
> it is likely that they and other DoH clients will send the user-agent
> along with their DoH queries.
>
> This exposes unnecessary metadata to the resolver, something that
> didn't exist on the resolver before DoH.
>
> Since RFC8484 does not require user-agent headers
> applications implementing DoH should not include
> such metadata by default.
> Some DoH implementations do it currently but it is early
> enough to improve that.
>
>
> DoH Privacy Enhancement: Do not set the user-agent header for DoH requests
> https://bugzilla.mozilla.org/show_bug.cgi?id=1543201
>
>
>
> --
> https://twitter.com/nusenu_
> https://mastodon.social/@nusenu
>
> --
> Add mailing list
> Add@ietf.org
> https://www.ietf.org/mailman/listinfo/add
>