Re: [dns-privacy] Concerns around deployment of DNS over HTTPS (DoH)
Kenji Baheux <kenjibaheux@google.com> Wed, 13 March 2019 02:36 UTC
Return-Path: <kenjibaheux@google.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7B40112716C for <dns-privacy@ietfa.amsl.com>; Tue, 12 Mar 2019 19:36:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.501
X-Spam-Level:
X-Spam-Status: No, score=-17.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0eOaGyIz8KkN for <dns-privacy@ietfa.amsl.com>; Tue, 12 Mar 2019 19:36:10 -0700 (PDT)
Received: from mail-qk1-x72d.google.com (mail-qk1-x72d.google.com [IPv6:2607:f8b0:4864:20::72d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 273A612705F for <dns-privacy@ietf.org>; Tue, 12 Mar 2019 19:36:10 -0700 (PDT)
Received: by mail-qk1-x72d.google.com with SMTP id n6so236502qkf.1 for <dns-privacy@ietf.org>; Tue, 12 Mar 2019 19:36:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=Ffq5Vu6QEgLJYfj5ACps64C/a0E+XzVo/f7YonL9Imo=; b=gxiZvqRBMOmqxBl6lI+vKjEqbTTXqui2CCyNLCPJS/Zb9Ro8lVQjl+WlnLM85o65bg rHUTkJEIYhAAo+ZslrfPpgSmwOD0AuXg59M+90aV/1aMpWzTCszl4gxqwxm1p8MW9NuX N8Krprk/qOIhdC72AiNQ3Ii8sG2kd6AU83w/DOIgqR+Fg4KE/DZT9bq+l6GYtoIoDmVK 2ACJp6Dt0O2qaJULRb4oLqhblhCqbBJvzPhPFKSHj7fuSNnXDHB8NiexGI+xRAneA3p6 q2m1akViSbUfxnLdaCo+eaapVLNTYqmIcEQz+hsDw4NxcmFN4Fjbk8JCRU7+MvodALkb a+zw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=Ffq5Vu6QEgLJYfj5ACps64C/a0E+XzVo/f7YonL9Imo=; b=XqUOWpLBL2mht8iv+u/961RCHHDR34Wgv5kpToiZr9GBivTOapGkmrrRYLDyYnJyuy fqvZWbKlZ/P+Brx0tygEassjEaVBsaTd29c2k0Yhc9QmGdH1LlbiTMaZdst+/SlhWDwN cKzWxJTK5OH52XmY1FXfw6pk2/Rrb5TlUpL2WxXWlreFhRpwPbSJFRJL+dCnlzAcR9d5 A2Tf86EjzOMhElFuRJHqIwLRhJJSOvyzvwwGQaBE2pM4mumQEwiqjfIoBMLy5F85r+zS gcwOwTjN9ayOYQb9vftm9n6RioP0oNPyjOoOPhkRep2fyxkhxrfEnty2W7s6cESzh+4n 1DWw==
X-Gm-Message-State: APjAAAUCThCL3kliFFyQrohedkfLGSZqOHPF0C8a1LdWjbI8hxjH87yd Det9DCkJ+ytcgQYZDOu9/cnvC/bEA+2JT5NjZVkMF+mi6gpKkQ==
X-Google-Smtp-Source: APXvYqxdt58Tmdt1V2ZqPNZuFqDgP6iHF+A55Jh028l3sObN+Pa/GoLeh2Ti0ONXml3Rlzp8WWTvM1HEpozORtVcwtc=
X-Received: by 2002:ae9:f20c:: with SMTP id m12mr17801073qkg.236.1552444568793; Tue, 12 Mar 2019 19:36:08 -0700 (PDT)
MIME-Version: 1.0
From: Kenji Baheux <kenjibaheux@google.com>
Date: Wed, 13 Mar 2019 11:35:57 +0900
Message-ID: <CADWWn7W19TX7Q8gQTJFHvUxg7jpR8UB8033QtcPK-N7wKafQKw@mail.gmail.com>
To: dns-privacy@ietf.org
Content-Type: multipart/alternative; boundary="0000000000000ee9780583f0aba7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/kpt6ZYMN5H3DsXPVi_QldmbAdJw>
Subject: Re: [dns-privacy] Concerns around deployment of DNS over HTTPS (DoH)
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Mar 2019 02:36:13 -0000
*(Sincere apologies about the multi-posting but the discussion seems to be happening in different places...)* Hi, I'm involved with Chrome's DoH efforts. I've noticed a few drafts listing concerns about certain types of deployment for DoH. It appears that the key concerns are based on assumptions about various browsers' plans. So, to address misunderstandings, I'd like to share some background, and the high level principles that guide our work on DoH in Chrome. Our motivations in pursuing DoH in Chrome is to offer our users a better user experience: - Stronger privacy and security. - Hopefully, some performance wins. Principles and illustrative* examples: 1. Provide our users with meaningful choice and control, e.g. allow end-users/admins to control and configure the feature, whether they want to use a custom DoH server, or just keep on using their regular DNS. 2. Don't surprise our users, e.g. don't silently force a different provider. 3. Continue to support admins for Education and Enterprise use cases, and parents for family use cases, e.g. prevent students/employees/kids from accessing unsafe/inappropriate websites. *: not necessarily our actual concrete plans (still WIP for the most part, subject to change due to unforeseen implementation hurdles, or informed by feedback and discussion, etc.), only shared as a comprehension aid. Tentative plans: - We are considering a first milestone where Chrome would do an automatic upgrade to DoH when a user’s existing resolver is capable of it. - There are some unanswered questions about how we will be doing that discovery, and would welcome input from the community. Perhaps, a good topic for IETF 104. - For Education and Enterprise use cases, we believe that a group policy to disable and/or configure the feature will be enough. - For family use cases, we believe that allowing users to keep using their existing solution or opting into a DoH compatible solution (if available) will be enough. - There are no plans to force any specific resolver without user consent / opt-in (see principle #2) We believe that starting with an automatic upgrade approach should address a lot of the concerns expressed in the various drafts, because it gives a chance to existing players to play an active role in providing stronger privacy and security to end-users. PS: I won't be able to join IETF 104 to discuss this face to face, but I will see if someone from our side can represent us. -- Kenji BAHEUX Product Manager - Chrome Google Japan