Re: [dns-privacy] Review of draft-ietf-dprive-rfc7626-bis-03 - Section 3.5.1.1 Comments

Eric Rescorla <ekr@rtfm.com> Fri, 10 January 2020 13:53 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 03BD81208DB for <dns-privacy@ietfa.amsl.com>; Fri, 10 Jan 2020 05:53:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JFULH-QmQruN for <dns-privacy@ietfa.amsl.com>; Fri, 10 Jan 2020 05:53:21 -0800 (PST)
Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 379DA1208D2 for <dns-privacy@ietf.org>; Fri, 10 Jan 2020 05:53:21 -0800 (PST)
Received: by mail-lf1-x12f.google.com with SMTP id b15so1533489lfc.4 for <dns-privacy@ietf.org>; Fri, 10 Jan 2020 05:53:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=LNgLwaDdE6UJVK50+vy0dvTqrCHVkJ/rJcLAvKCv87A=; b=cCRvNI/57wMHFd1jGkn/NzrAHowKyi5YqXlBokejGRAz3NGtHCBLcNb+hEllMdZGyQ AKEdPwGhFK15UX5DGT374vM6YfRo6R4d5AFO99yB0bPPpgj4gc5gv9eqrWpAdxJyDVJ+ t5LN2sf7YDhg50l37AlkLBPrzQLelBK8nqqRJ9JIkA14Ar2/HXaAFt55s5+94rnUce5H MQIu53jL7rr1vJkW5uY7gwug9YUrCep/FBWQ70TwPvxKHbZQjksYfkIP9BG2UISnmnPd Nofz9r6uG9pDTKw7+5zdtVgOCAwt4sHzWM6FkFn7TaOzlN4SKSRtR9NXPw9pn3nhVpvg YKog==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=LNgLwaDdE6UJVK50+vy0dvTqrCHVkJ/rJcLAvKCv87A=; b=hYxTCNizWK77RCggzxDEAtMb/qGGXZz+n8zHRRPTCYJomYSCpeYZynOJVfMDYKeEOb hNRszrJrvoSuhbABkZKYtKg+uaxYB4lD5fwwIjLFqP2khspzKAb9qksfB5xfQiaB6q26 gCVaxUEyGwqsvxZxCs/C/N0LbBV9rKpPp5YAPK3wpYqbTWVbJfgBxtItO11N3llPclB2 enSfkvc/e7/i9wRjUawb15apQtxkpFDEaxBzB23TG4uP1CrC7+DcEQ7qtKrQxqgMsXCA 192tkTG4yRg7SRvuLT0Gr2lqsX2bqzoAoor9bthK0uwk9u6sgyb2kjOVKDA0jy0JItfR DrkA==
X-Gm-Message-State: APjAAAU0yBnQcZv8y8XgXw3gDDxQ8MRD+xhXtVU7GHb6nj5ooSHYpm8n LfaxlamXk6gBxlm57giQE5lYvzGKDlx5heShfHiV2RNnEY8=
X-Google-Smtp-Source: APXvYqwQ9dqJq4QQq292M95hINIjKsiCw3laQa/EiPNK+wRcOJQyJvhysVv478KFqbKBU9y90cOtpdDDeL8R6cU3eDY=
X-Received: by 2002:a19:114:: with SMTP id 20mr2392409lfb.25.1578664399423; Fri, 10 Jan 2020 05:53:19 -0800 (PST)
MIME-Version: 1.0
References: <4639bd67-6fca-47d1-aaeb-85fcd0394f46@www.fastmail.com> <7E5F804D-535F-4CB3-8F7F-ABD0ED4B833A@sinodun.com> <CABcZeBON0ung2htbaiKWGKJSUsHrPhrcEfJgVDoO3+UYCQZxsg@mail.gmail.com> <7729E44B-38EB-4EAF-8EFF-ED286696373E@sinodun.com> <CABcZeBNKsQ1pEVwxwYMgGTUhFntQ4h+L1Qyo=Q_nfN7p13y-UQ@mail.gmail.com> <90C8D89F-0FB0-4C12-818A-63CC820FCB52@sinodun.com>
In-Reply-To: <90C8D89F-0FB0-4C12-818A-63CC820FCB52@sinodun.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 10 Jan 2020 05:52:43 -0800
Message-ID: <CABcZeBM-aMDC_XDhJqQprKJ8eTjA-PwooSdVf0VsBuxLcc-vYA@mail.gmail.com>
To: Sara Dickinson <sara@sinodun.com>
Cc: last-call@ietf.org, DNS Privacy Working Group <dns-privacy@ietf.org>, Martin Thomson <mt@lowentropy.net>
Content-Type: multipart/alternative; boundary="000000000000bf61ba059bc97255"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/eeqWpf5vNIgdhIncLR7vVoDqxvc>
Subject: Re: [dns-privacy] Review of draft-ietf-dprive-rfc7626-bis-03 - Section 3.5.1.1 Comments
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 13:53:25 -0000

On Thu, Jan 9, 2020 at 10:03 AM Sara Dickinson <sara@sinodun.com> wrote:

>
>
> On 7 Jan 2020, at 22:47, Eric Rescorla <ekr@rtfm.com> wrote:
>
>
>
> On Tue, Jan 7, 2020 at 10:37 AM Sara Dickinson <sara@sinodun.com> wrote:
>
>>
>>
>> On 19 Dec 2019, at 02:09, Eric Rescorla <ekr@rtfm.com> wrote:
>>
>>
>>
>> On Wed, Dec 18, 2019 at 7:06 AM Sara Dickinson <sara@sinodun.com> wrote:
>>
>>>
>>>
>>> > On 2 Dec 2019, at 00:00, Martin Thomson <mt@lowentropy.net> wrote:
>>>
>>
>> <snip>
>>
>>
>>> Suggest replacing the last 4 paragraphs of this section with the
>>> following text.
>>>
>>
>> I can't say I like this very much.
>>
>>>
>>> “It has been pointed out that should the trend towards using large
>>> public resolvers increase, an increased centralisation of DNS resolution
>>> services will result.
>>>
>>
>> Well, it's been pointed out, but it's not at all clear that it's true,
>> due to the large amount of centralization of ISPs in certain areas, so no,
>> I don't think this document should make this claim.
>>
>>
>> To address the more general problem I suggest:
>>
>> “Should the trend away from using ISP managed resolvers to using a small
>> set of large public resolvers continue, then an increased proportion of the
>> global DNS resolution traffic will to be served by only a few entities.
>> Some potential impacts of centralisation within the Internet Infrastructure
>> are outlined in [I-D.draft-arkko-arch-infrastructure-centralisation] and
>> include some privacy related considerations. "
>>
>
> Yeah, my point is that I don't agree with this. Right now there is a lot
> of ISP centralization and the move of some of that traffic to public
> resolvers potentially decreases centralization at the margin. I certainly
> don't agree with citing draft-arkko, which is not at all a neutral or
> factual source, so this is just a way of incorporating by reference
> material which doesn't have consensus.
>
>
> There was much follow up on this point, thank to everyone that
> contributed. My summary of those comments seem to be the there is a desire
> to include text covering the fact that centralisation is happening in many
> forms and has a mixed impact.  I suggest the following text
>
> “As with many other protocols issues around centralisation also arise with
> DNS. The picture is fluid with several competing factors contributing which
> can also vary by geographic region. These include:
> * ISP outsourcing, including to third party and public resolvers
> * regional market domination by one or only a few ISPs “
>
> An increased proportion of the global DNS resolution traffic being served
> by only a few entities means that the privacy considerations for end users
> are highly dependant on the privacy policies and practices of those
> entities.”
>
> I also previously proposed referencing
> draft-arkko-iab-internet-consolidation that Stephane mentioned, but Ekr
> objected.
>

I understand that there are a number of people who would like to include
this material, but it isn't actually about DNS privacy in particular, nor
about DoH or DoT, which are just protocols, but about deployment models,
and so isn't really in scope here.

More generally, this document should not be trying to document or argue the
discussions that are happening about ADD.





>
>
> An increasing number of applications are offering application-specific
>>> encrypted DNS resolution settings, rather than defaulting to using only the
>>> system resolver. Due to a lack of a standardized discovery mechanism for
>>> DoH and Strict DoT servers, applications that do so are currently limited
>>> to using hard coded lists of resolvers and a variety of heuristics and
>>> resolvers are available in different applications. At the time of writing,
>>> efforts to provide standardized signalling mechanisms for applications to
>>> also discover the services offered by local resolvers are in progress
>>> [I-D.ietf-dnsop-resolver-information]. Note that an increasing numbers of
>>> ISPs are deploying encrypted DNS, for example see the Encrypted DNS
>>> Deployment Initiative [EDDI].
>>>
>>
>> I'm not sure what the point of this text is, but it seems kind of
>> confusing.. In particular, it's not the case that the primary reason that
>> Firefox uses a hardcoded list is because there is no standardized discovery
>> mechanism.
>>
>>
>> To clarify I suggest:
>>
>> “An increasing number of applications are offering application-specific
>> encrypted DNS resolution settings, rather than defaulting to using only the
>> system resolver. A variety of heuristics and resolvers are available in
>> different applications including hard-coded lists of recognised DoH/DoT
>> servers.
>>
>> There is currently no standardized discovery mechanism for DoH and Strict
>> DoT servers so applications that might want to dynamically discover such
>> encrypted services are not able to. At the time of writing, efforts to
>> provide standardized signalling mechanisms for applications to also
>> discover the services offered by local resolvers are in progress
>> [I-D.ietf-dnsop-resolver-information]. Note that an increasing numbers of
>> ISPs are deploying encrypted DNS, for example see the Encrypted DNS
>> Deployment Initiative [EDDI]."
>>
>
> I don't object to this text, but what's the point?
>
>
> The point is to describe the privacy considerations of an entirely new
> deployment model for DNS that didn’t exist when the original RFC was
> published.
>


See above.
-Ekr