Re: [dns-privacy] Alissa Cooper's Discuss on draft-ietf-dprive-bcp-op-08: (with DISCUSS and COMMENT)

Alissa Cooper <alissa@cooperw.in> Sun, 28 June 2020 18:43 UTC

Return-Path: <alissa@cooperw.in>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6B163A0E90; Sun, 28 Jun 2020 11:43:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=cooperw.in header.b=Uh+P0xTA; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=tegL3q0P
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3-1-QhOQKb-4; Sun, 28 Jun 2020 11:42:58 -0700 (PDT)
Received: from wout3-smtp.messagingengine.com (wout3-smtp.messagingengine.com [64.147.123.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A27E3A0E8F; Sun, 28 Jun 2020 11:42:57 -0700 (PDT)
Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.west.internal (Postfix) with ESMTP id D1BAB953; Sun, 28 Jun 2020 14:42:55 -0400 (EDT)
Received: from mailfrontend2 ([10.202.2.163]) by compute4.internal (MEProxy); Sun, 28 Jun 2020 14:42:56 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cooperw.in; h= from:message-id:content-type:mime-version:subject:date :in-reply-to:cc:to:references; s=fm3; bh=Eq4oaBJ42KpYzXRvXDhPKxw IyWa0lrE7V7d6ippA5ZY=; b=Uh+P0xTAeM0QmXXyNNC5G9MNFBPLDDrTgcfHTgW vCXckIKk6cUmjftVhK9n+rLBY42K0O1DTV64+HMRs/EXImxQsQM6dgBKtEUSWLtD xcYEw4nOzvdvaVNrKIXTYBH0/nRq4f41gdRschDm+SEfQAYk1NM3V7s8uf08qBzO crQ0DsUzxEswzGUqORNEK2x4ubKxSlD3Tu0goSmKISXll1NH6yVSRGbA0xY+O6MS EFb0SZHZoSC1KfOPT32ASAFgsaNWSQab2jug1OjrN7Z2/FUz48Y/aUf2enZXUL6I zA2nTu1b6z25lG499oCBjyjoLloYleL4qJimQ2jaK5+JE5g==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=Eq4oaB J42KpYzXRvXDhPKxwIyWa0lrE7V7d6ippA5ZY=; b=tegL3q0PtnF9xo9vABBDXq Weblii8//7yzl7ZKd4q77QlcKbuRRA/BFWwxCdLtmPT13iwJbtEYR02OssKOjbMq dpdq/lWzmjTWU2nBuS6gDHMoM3GPwyAkTcyj6X6a4HoxA5OBytAjUwO40RpbSFHW MZ91UkRe2O+UGYbRgLovyGvtR4cGz4FJuogdH7WFl6kkcy3U0sOY7DNzIorHa+d9 KThj/CcW/ONnGEoYYHa1D1Pfb1OdnyOkWK4de6ewr8RySTGzgUdTBeTxkQxEoYAV uok9QwO4gffbve/DIOiz0Md74tVyscbpfB8bKp2oOFHUcKWcE0QLP+jkMGg1P/Ew ==
X-ME-Sender: <xms:r-T4XiHR0qV24d-OoyHuf-2701FfYrHHh_zuhyQF91Uig4QX3ygm0Q>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrudeliedgudeftdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enucfjughrpefhkfgtggfuffgjvfhfofesrgdtmherhhdtjeenucfhrhhomheptehlihhs shgrucevohhophgvrhcuoegrlhhishhsrgestghoohhpvghrfidrihhnqeenucggtffrrg htthgvrhhnpeefjeevuddugffhueeuledvleetkefhtefggfevgfefjefhkeeuhfelteev uddufeenucffohhmrghinhepfihikhhiphgvughirgdrohhrghdptghishgtohdrtghomh dptghlohhuughflhgrrhgvrdgtohhmpdhgohhoghhlvgdrtghomhenucfkphepudejfedr feekrdduudejrdejtdenucevlhhushhtvghrufhiiigvpedtnecurfgrrhgrmhepmhgrih hlfhhrohhmpegrlhhishhsrgestghoohhpvghrfidrihhn
X-ME-Proxy: <xmx:r-T4XjXNCLMhrQr0KlCjpsrk1i6CNEZy5r-2vdNrgCt1HGx2PhqHFA> <xmx:r-T4XsJVWT19CN4smcrmYPmEDAXcsG1l1pdprK1ctMIpItK0XQRd-A> <xmx:r-T4XsE70fEgar-rBu0w4w8zhv_2Uknb1se6vz8eEEjMg0l-0Mzs0g> <xmx:r-T4XvTiZt1Ce-KEFW_rif34IN6rtML3Zc-dHS1IbkhdsiHsNwlk8A>
Received: from rtp-alcoop-nitro2.cisco.com (173-38-117-70-rtp-corp-nat-pool.cisco.com [173.38.117.70]) by mail.messagingengine.com (Postfix) with ESMTPA id ADA2F3067BBD; Sun, 28 Jun 2020 14:42:54 -0400 (EDT)
From: Alissa Cooper <alissa@cooperw.in>
Message-Id: <9826D3BC-02B4-4249-81AF-D118543C69A1@cooperw.in>
Content-Type: multipart/alternative; boundary="Apple-Mail=_952757CA-9B46-467D-8563-EA25E120F1DE"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.5\))
Date: Sun, 28 Jun 2020 14:42:53 -0400
In-Reply-To: <C1CFDF13-7363-422C-A55E-4E4D48E722A3@sinodun.com>
Cc: Vittorio Bertola <vittorio.bertola@open-xchange.com>, IESG <iesg@ietf.org>, draft-ietf-dprive-bcp-op@ietf.org, Tim Wicinski <tjw.ietf@gmail.com>, dprive-chairs@ietf.org, dns-privacy@ietf.org
To: Sara Dickinson <sara@sinodun.com>
References: <158092849390.12844.858648659336509426.idtracker@ietfa.amsl.com> <C1CFDF13-7363-422C-A55E-4E4D48E722A3@sinodun.com>
X-Mailer: Apple Mail (2.3445.9.5)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/fVK0j2bN-3OUPbMQELjE7lH6UII>
Subject: Re: [dns-privacy] Alissa Cooper's Discuss on draft-ietf-dprive-bcp-op-08: (with DISCUSS and COMMENT)
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Jun 2020 18:43:01 -0000

Hi Sara,

Thanks for your response and the updates to the document. I’ve trimmed my DISCUSS down to the remaining issue.

> On Mar 4, 2020, at 8:29 AM, Sara Dickinson <sara@sinodun.com> wrote:
> 
>> 
>> (3) I do not think item #5 in Section 6.1.2 belongs in this document. I don't
>> see how it is within scope for the IETF to be specifying these sorts of best
>> practices, which are not technical or operational in nature but focus on legal
>> matters and likely require the involvement of lots of lawyers in order to get
>> the provisions written. 
> 
> I’m channelling Vittoro here (cc’ed) who as a Head of Policy helped to formulate this text…
> 
> The reason this was included is that the actual policy that will apply to the data is the merge of the operator's privacy policy and of the relevant jurisdiction's privacy laws, with the latter overriding the former in case of conflict. Since the former is in scope for the DROP it seems reasonable for the latter to be. If the goal here is to provide a document that informs users of what will actually be done with their data, then outlining which privacy laws will apply to them and how these laws will play out seems reasonable. 

I don’t really see how the above is responsive to my point. This is not the IETF’s area of expertise and therefore we should not be specifying best practices about it. Every IETF technology exists within a framework of laws and regulations that vary by jurisdiction, but we don’t specify best practices about them because they aren’t within our scope. We also don’t want our RFCs to be obsolete because one country or region decides to change its laws — we’re aiming for global significance.

> 
>> Also, I think what
>> this section asks for is not the norm today and therefore it seems odd for the
>> IETF to specify a best practice that operators may not have any chance of being
>> able to comply with (e.g., listing specific law enforcement agencies, privacy
>> laws, or countries where data centers will reside and the data will never move
>> from them).
> 
> It's also not true that supplying this information is "not the norm today". Any GDPR-compliant privacy policy must specify the legal entity processing the information, its place of business, the user's rights, and whether the information will be moved to third countries. Basically, points 5.1-5.3 only turn into best practice what the GDPR mandates in Europe - and there is little doubt among privacy experts that the GDPR is the current global best practice in terms of privacy laws. 

The IETF operates globally and I think endorsing the idea of fracturing data management and protection along jurisdictional lines is far from a best practice that the body of the IETF’s work endorses.

> 
> As for 5.4, there are already significant efforts for the disclosure of law enforcement access, even in the US and even with creative ways to circumvent legal issues (see https://en.wikipedia.org/wiki/Warrant_canary <https://en.wikipedia.org/wiki/Warrant_canary> ). It's not an issue that has no grounds in reality.


Best,
Alissa

> 
> 
>> 
>> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> Section 1:
>> 
>> "This document does not, however,
>>      define a particular Privacy statement, nor does it seek to provide
>>      legal advice or recommendations as to the contents."
>> 
>> This is not accurate. The document does make recommendations about the contents.
> 
> Will remove ‘or recommendations’. 
> 
> 
>> 
>> Section 3: "the privacy of the DNS" strikes me as a bit of an odd term as the
>> DNS itself doesn't have privacy needs. Perhaps this means the privacy
>> properties of the DNS.
> 
> Yes - will update. 
> 
>> 
>> Section 5.2.3: I think the table and its associated text belongs in Appendix B.
>> It is not BCP material itself and is not readily understandable without the
>> rest of the text in Appendix B anyway.
> 
> Fair enough - will move this. 
> 
>> 
>> Section 5.2.4: "Resolvers _might_ receive client identifiers e.g.  MAC
>> addresses in EDNS(0) options - some Customer-premises equipment (CPE) devices
>> are known to add them." It would be great to add a citation there if one exists.
> 
> Yes - will add. 
> 
>> 
>> Section 5.3.3:
>> 
>> "Operators should not provide identifiable data to third-parties
>>   without explicit consent from clients (we take the stance here that
>>   simply using the resolution service itself does not constitute
>>   consent)."
>> 
>> I'm not convinced its appropriate for this document to be commenting on what
>> constitutes consent.
>> 
>> I also think that as a general matter the research in this area demonstrates
>> that privacy-by-consent is broken and that the number of cases in which an
>> individual providing consent for identifiable data sharing actually reads,
>> understands, and agrees with the terms of the sharing is miniscule.
>> 
>> It seems like the real best current practice mitigation here is to not share
>> identifiable data.
> 
> I appreciate the difficulties with this, but several aspects of this draft have got push back on the basis of how many operators actually employ the ‘best practice’. The reality is that many of the large recursive operators currently make some statement about the DNS service or in an umbrella privacy statement to the effect that they will share data if they have consent (and then completely fail to describe what that consent entails), for example:
> 
> https://www.cisco.com/c/en/us/about/legal/privacy-full.html <https://www.cisco.com/c/en/us/about/legal/privacy-full.html>  (Overall policy which appears to apply to OpenDNS - OpenDNS doesn’t seem to have a specific one)
> We may share your personal information with third parties for the purposes of operating our business, delivering, improving, and customizing our Solutions, sending marketing and other communications related to our business, and for other legitimate purposes permitted by applicable law or otherwise with your consent.
> 
> https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/ <https://developers.cloudflare.com/1.1.1.1/commitment-to-privacy/privacy-policy/privacy-policy/>
> Cloudflare will not sell, license, sublicense, or grant any rights to your data that we collect from DNS queries to any other person or entity without your consent. 
> 
> https://policies.google.com/privacy?hl=en <https://policies.google.com/privacy?hl=en> (Overall policy referenced from the Google Public DNS privacy policy page)
> We’ll share personal information outside of Google when we have your consent.
> 
> 
> It is somewhat frustrating that this draft doesn't tackle this issue in any meaningful way. We had previously included a clause in the DROP statement where the operator was recommended to outline their specific consent process (so in other words, not defining consent in this document in any way,  just requiring operators to clarify how _they_ define it given they have used the word) but this received some push back.
> 
> Adding an optimisation describing the ideal position (not sharing) seems reasonable, as would adding any additional text to clarify the limitations of the definition of consent in this document, but removing it completely would mean virtually no large operators would ever be even minimally compliant…..
> 
> 
>> 
>> Section 6.1.1: "Make an explicit statement that IP addresses are treated as
>> PII." PII is a bit of a jurisdiction-specific term. I would recommend using the
>> definition of personal data from RFC 6973.
> 
> Ack. 
> 
>> 
>> Section 6.2: This section should be an appendix.
> 
> That’s fine. 
> 
>> 
>> Section A.2: I don't understand why the reference to Section 8 of RFC 8484
>> isn't just in the bulleted list with all the other documents, and why there is
>> a generic note included with it when the specific privacy implications are more
>> completely discussed in the referenced section of RFC 8484 (just like with the
>> other documents in the list).
> 
> I think that text came in before RFC8484 was published and section 8 was quite limited, happy to convert to a bullet point.
> 
> Best regards
> 
> Sara. 
>