Re: [dns-privacy] Datatracker State Update Notice: <draft-ietf-dprive-rfc7626-bis-04.txt>

Eric Orth <ericorth@google.com> Tue, 07 April 2020 16:23 UTC

Return-Path: <ericorth@google.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC2673A0E11 for <dns-privacy@ietfa.amsl.com>; Tue, 7 Apr 2020 09:23:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6zt_WK-4YTqh for <dns-privacy@ietfa.amsl.com>; Tue, 7 Apr 2020 09:23:03 -0700 (PDT)
Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79A703A0E12 for <dns-privacy@ietf.org>; Tue, 7 Apr 2020 09:23:03 -0700 (PDT)
Received: by mail-wr1-x42c.google.com with SMTP id h9so4576542wrc.8 for <dns-privacy@ietf.org>; Tue, 07 Apr 2020 09:23:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=t8aCrsRVOp7ZOEqwICUjRJyiWRZlZJDEfFDFdE66jZE=; b=BOYF65oktbjNubxThqlA4wE56mIFooKwGGpvDw1EZKGkSS3zqLNdZco6P9QNDZtNNw imH19SGhXPaWaejD/dTLPhve9FNE94chRlN1mx5Mb8+0ntLFGxTpcULaijmX8iDPds0j xQrHfrZ9SCiHipAMWrWIAhZeIU8Fv8lMIZb4w5SWEmcWSy6tY3Xd5DNclDx2OZG2q2NS j8wTuuweoSJG0qUL+rOMwyJkpywEdgHCrCf+0zAU9MlWuagUS+srrdGxx30gQ6xiGNq+ 0BlY+a4McM7Mig4Ti9nL2TbQnwJXXd/PoFXlbXxZhjA3kIL4mK5tR8Dv6cIi75V1/Ppp x4sQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=t8aCrsRVOp7ZOEqwICUjRJyiWRZlZJDEfFDFdE66jZE=; b=eLGWAb8KD5O+zUPh1pykcX0tK2Ibt2UG6KIdXgHvAW1LE8YiIouL4+VYU/EmRaJkUs YxcjFXGsQ5O04LnUGhj5GPXmPv1ta65j96xf0zni9zNnfkDFa6mU2qq0ysbXfiug22SM KsZlZhzSbQyN6BuKnXYgBAc00VoQaUxH+haxcpFbSwkaBOjeBn6trbUXP+k2byMBvRlI wl2REstHN2+QMDtZ+nHmDNjejf2ZbWqar1NAnexn6fLV+D43S67hFXnoXOx3pj/MayzJ G8yvhVLGwbr0s1BfCz0PhKySfxk9lGa4u6xB6TjzsD09yZTxlf9VZhaeWIxrRJd35VNm +cJg==
X-Gm-Message-State: AGi0PubbmrdjRSOf0FqsZmvKN223CJV28kRN25HMvnr7GMCwtAJ05MNT B/eHiJh3Gkt0G+LxxkFW9pY44gxp39/JKk+nzF4SonppP7k=
X-Google-Smtp-Source: APiQypKuZeSYHXY/aHpFv8Htl1qhCO++MMVrOtXW/od54bgZ6hj5irfGLo8m52RuQHWENtmyn0uOqCWXplbZEHeuS08=
X-Received: by 2002:adf:e588:: with SMTP id l8mr3395692wrm.186.1586276581531; Tue, 07 Apr 2020 09:23:01 -0700 (PDT)
MIME-Version: 1.0
References: <157955609351.1744.15099511006231348523.idtracker@ietfa.amsl.com> <417BE033-4DE5-452A-BE93-0657C83051BC@cisco.com> <CABcZeBPK3yAaoai4ccd=hSffk5cAhoSC7gnBNqs36x-xJf=R-Q@mail.gmail.com> <503E2696-AB4A-4020-90CC-802D312D23AF@sinodun.com> <CABcZeBOiEu8qO_VHtHc7Fs47Wh0tGDn3ywM5LDZtWoxuHZ_isw@mail.gmail.com> <721AD54C-0324-4400-8492-4AA19A64699D@sinodun.com> <CABcZeBP4CknS=9Y96CqgykChg4H_jrgkaWmHPN4319+nXe=10w@mail.gmail.com> <CAH1iCiobuYitR26Hh0pbYpA_JZoB1a1iMyHJs1FAgW9GtOk56g@mail.gmail.com> <CABcZeBNa-OTEYjnL=+-F=WK3hZiOWmty1S=FC43Fr3CxuCPE_g@mail.gmail.com> <32D26638-2464-4E7B-8869-C65F773EF5F2@sinodun.com> <CABcZeBNnAZ1ttKHdtZMwWZGvWAYn3jZBps+hXOBMHQXgaKPUEA@mail.gmail.com> <00AF0382-CD8B-46F3-9838-50602379FE9F@sinodun.com> <CABcZeBOELM=d0xXgYN+r4cNsRO6=oyQscdwwdSTqypV5gNra0A@mail.gmail.com> <F6C06842-9D76-45DF-84A0-B0C4D724E66E@sinodun.com> <CABcZeBPVocy593=WJM2k3Ytrwg36qc_1d4VQH3otRM5qyvZwLA@mail.gmail.com> <1388052392.1781.1586274052101@appsuite-gw1.open-xchange.com> <CABcZeBNi2LKvGFcmTM0uC+rFEVm5tgw6Zo1LS_CoO5=Zo0zqSA@mail.gmail.com> <C03AC6C2-9DCB-448A-B906-3062BD616E31@sinodun.com>
In-Reply-To: <C03AC6C2-9DCB-448A-B906-3062BD616E31@sinodun.com>
From: Eric Orth <ericorth@google.com>
Date: Tue, 07 Apr 2020 12:22:49 -0400
Message-ID: <CAMOjQcGrWXFpStp=iVbo1jVN3qnen8rC71SyXv6evY2-MgUdxg@mail.gmail.com>
To: Sara Dickinson <sara@sinodun.com>
Cc: Eric Rescorla <ekr@rtfm.com>, "dns-privacy@ietf.org" <dns-privacy@ietf.org>, Vittorio Bertola <vittorio.bertola@open-xchange.com>, "dprive-chairs@ietf.org" <dprive-chairs@ietf.org>, "Eric Vyncke (evyncke)" <evyncke@cisco.com>, "draft-ietf-dprive-rfc7626-bis@ietf.org" <draft-ietf-dprive-rfc7626-bis@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000028ca5a05a2b5cc6f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/gwXsrWer9nl-t43mskbluhzTZ64>
Subject: Re: [dns-privacy] Datatracker State Update Notice: <draft-ietf-dprive-rfc7626-bis-04.txt>
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Apr 2020 16:23:07 -0000

"consistent application-level controls across the device"

Right there is where followers of the misunderstanding will read this text
incorrectly.  Browsers and other non-malicious applications allowing
control does not guarantee consistent application control.

On Tue, Apr 7, 2020 at 12:13 PM Sara Dickinson <sara@sinodun.com> wrote:

>
>
> On 7 Apr 2020, at 16:47, Eric Rescorla <ekr@rtfm.com> wrote:
>
>
>
> On Tue, Apr 7, 2020 at 8:40 AM Vittorio Bertola <
> vittorio.bertola@open-xchange.com> wrote:
>
>>
>> Il 07/04/2020 17:23 Eric Rescorla <ekr@rtfm.com> ha scritto:
>>
>>
>>
>> On Tue, Apr 7, 2020 at 7:38 AM Sara Dickinson < sara@sinodun.com> wrote:
>>
>> The goal of this text is to enumerate for the end user the privacy
>> considerations of using such an application so I propose this text:
>>
>> "For users to have the ability to manage the application-specific DNS
>> settings in a similar fashion to the OS DNS settings, each application also
>> needs to expose the default settings to the user, provide a configuration
>> interface to change them, and support configuration of user specified
>> resolvers.
>>
>> If all of the applications used on a given device also provide a setting
>> to use the system resolver, then the device can be reverted to a single
>> point of control for all DNS queries. If not, then (depending on the
>> application and transport used for DNS queries) users should take note that
>> they may not be able to inspect all their DNS queries or manage them to set
>> device wide controls e.g. domain based query re-direction or filtering. “
>>
>>
>> I don't think this addresses my concern, because "revert" implies that
>> this is somehow the default situation, which, as I said, is not clearly the
>> case because applications have been doing their own resolution for some
>> time.
>>
>> In the interest of moving forward, i suggest you change the term
>> "reverted" to "configured" and add at the end "Note that this does not
>> guarantee controlling malware name resolution as it can simply ignore
>> whatever the system resolver and any user configuration settings.."
>>
>> I don't understand where in the proposed text there was a reference to
>> malware that prompted further discussion of the effectiveness of using DNS
>> to counter it. In any case, if we think that we need to discuss this topic
>> at that point in the draft, one should also note that there also are ways
>> to prevent malware from reaching a different resolver, though they are less
>> likely to work once connections are encrypted, etc. But I think that this
>> would make reaching consensus even harder, so perhaps we could avoid doing
>> so and just focus on suggestions related to application configuration.
>>
>
> Well, I would be happy to strike this text entirely. However, the text
> speaks of "control" and if we're going to say that, we should acknowledge
> that the system DNS is not going to let you control malicious applications
> because malware can just do its own resolution. As it is, I think the text
> gives a false impression
>
>
> How about making the last sentence a little more specific instead:
>
> If not, then (depending on the application and transport used for DNS
> queries) users should take note that they may not be able to inspect the
> DNS queries generated by such applications, or manage them to set
> consistent application-level controls across the device for e.g. domain
> based query re-direction or filtering. “
>
> Sara.
>
>
> -Ekr
>
> --
>>
>> Vittorio Bertola | Head of Policy & Innovation, Open-Xchange
>> vittorio.bertola@open-xchange.com
>> Office @ Via Treviso 12, 10144 Torino, Italy
>>
>>
> _______________________________________________
> dns-privacy mailing list
> dns-privacy@ietf.org
> https://www.ietf.org/mailman/listinfo/dns-privacy
>