Re: [dns-privacy] Review of draft-ietf-dprive-rfc7626-bis-03 - Section 3.5.1.1 Comments

Eric Rescorla <ekr@rtfm.com> Tue, 07 January 2020 22:47 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dns-privacy@ietfa.amsl.com
Delivered-To: dns-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64E6E1200B3 for <dns-privacy@ietfa.amsl.com>; Tue, 7 Jan 2020 14:47:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vzCPt1mNLMDa for <dns-privacy@ietfa.amsl.com>; Tue, 7 Jan 2020 14:47:41 -0800 (PST)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF8A0120025 for <dns-privacy@ietf.org>; Tue, 7 Jan 2020 14:47:40 -0800 (PST)
Received: by mail-lf1-x12c.google.com with SMTP id n25so983906lfl.0 for <dns-privacy@ietf.org>; Tue, 07 Jan 2020 14:47:40 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=389f5GE+InsVAi5cO6WNioTqEmTkg8zKs1Ruye41F84=; b=mCD6mVYZSJmz6NNn2gdYZrEXponDSBviguy9mEBVpt/3tn7vA3vXfTdDVYw7xwWvo2 G49duqgB2IQKg3+s3zSTtF6WOuQGJVAu0NE6wrTbKylXoE71GrPLXfQig9DuQ+5PBN83 3D7MSVOQUEA9vbLuQTyZz2osScVjP6fz7y40m1ALpECZ3LxBL8fuzBrZs0UbDjyB9mjh oxW4UPBn11THlQS9vsaTX2MRQ7pz5GBrdKFsf3R8DAyiLWJ0FCY4osr0f7zAThxUuSGt PxBBVKfXnBYLf0LkCoDeZ8MYYbedo0ydZ/5D18rqcgGeihLKYkAXD+dXGTDOnTjcXqpy Ut4Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=389f5GE+InsVAi5cO6WNioTqEmTkg8zKs1Ruye41F84=; b=GibJYL7B2aYxhdW2mj+5KU6eW4OwLBrCQttLpz8jvY+vcv/Ep6ZB15zcIPQS/VGI4b sNIrr7z8Cr6M/vPZiud6pG3R0YcVzwFmmFCYEUxr6hgc7t9FAiQLp7dlrWdESxoLXi1q bWSCcMKAvLcc5M+V+saPyAGUBC5Bc9X/8O5X06P5IRs1TFXvGmfgsti7qtLwclcLRAmM Ab5OzkegdL1lWMJ4Xx0S+JGrm+NeYsgUEN83JnyMl8WQrGba3bcr4E3e5T1rCfG7coqT oEq8GpcI79WwIRM6WgMpC4n30G01mbiYPlH69s5iedWETes1deoq+82LK2/Ug+o3VRr/ pd2A==
X-Gm-Message-State: APjAAAWKyv9iCj+eKnQtVQbvpTc0wugALS9kVq1OvGN6QlpN5nHBVKKA P2M6jzwj83Kags5YKkzLp5VRz0PXYN83KWtfyartpQ==
X-Google-Smtp-Source: APXvYqwcqDDgSXplT+rlwD1ZklonVORmKblDtpLrdR/ZCN+bgOq+l4Fp6KtG5S8fGd5yORVHHpWrsyKPOz59gpuPxyc=
X-Received: by 2002:ac2:4422:: with SMTP id w2mr1023047lfl.178.1578437258956; Tue, 07 Jan 2020 14:47:38 -0800 (PST)
MIME-Version: 1.0
References: <4639bd67-6fca-47d1-aaeb-85fcd0394f46@www.fastmail.com> <7E5F804D-535F-4CB3-8F7F-ABD0ED4B833A@sinodun.com> <CABcZeBON0ung2htbaiKWGKJSUsHrPhrcEfJgVDoO3+UYCQZxsg@mail.gmail.com> <7729E44B-38EB-4EAF-8EFF-ED286696373E@sinodun.com>
In-Reply-To: <7729E44B-38EB-4EAF-8EFF-ED286696373E@sinodun.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Tue, 07 Jan 2020 14:47:02 -0800
Message-ID: <CABcZeBNKsQ1pEVwxwYMgGTUhFntQ4h+L1Qyo=Q_nfN7p13y-UQ@mail.gmail.com>
To: Sara Dickinson <sara@sinodun.com>
Cc: last-call@ietf.org, DNS Privacy Working Group <dns-privacy@ietf.org>, Martin Thomson <mt@lowentropy.net>
Content-Type: multipart/alternative; boundary="0000000000001f14a3059b949016"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dns-privacy/uZLEr7jqGa4wtqz6HNmNZjYSwH0>
Subject: Re: [dns-privacy] Review of draft-ietf-dprive-rfc7626-bis-03 - Section 3.5.1.1 Comments
X-BeenThere: dns-privacy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <dns-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dns-privacy/>
List-Post: <mailto:dns-privacy@ietf.org>
List-Help: <mailto:dns-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-privacy>, <mailto:dns-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jan 2020 22:47:45 -0000

On Tue, Jan 7, 2020 at 10:37 AM Sara Dickinson <sara@sinodun.com> wrote:

>
>
> On 19 Dec 2019, at 02:09, Eric Rescorla <ekr@rtfm.com> wrote:
>
>
>
> On Wed, Dec 18, 2019 at 7:06 AM Sara Dickinson <sara@sinodun.com> wrote:
>
>>
>>
>> > On 2 Dec 2019, at 00:00, Martin Thomson <mt@lowentropy.net> wrote:
>>
>
> <snip>
>
>
>> Suggest replacing the last 4 paragraphs of this section with the
>> following text.
>>
>
> I can't say I like this very much.
>
>>
>> “It has been pointed out that should the trend towards using large public
>> resolvers increase, an increased centralisation of DNS resolution services
>> will result.
>>
>
> Well, it's been pointed out, but it's not at all clear that it's true, due
> to the large amount of centralization of ISPs in certain areas, so no, I
> don't think this document should make this claim.
>
>
> To address the more general problem I suggest:
>
> “Should the trend away from using ISP managed resolvers to using a small
> set of large public resolvers continue, then an increased proportion of the
> global DNS resolution traffic will to be served by only a few entities.
> Some potential impacts of centralisation within the Internet Infrastructure
> are outlined in [I-D.draft-arkko-arch-infrastructure-centralisation] and
> include some privacy related considerations. "
>

Yeah, my point is that I don't agree with this. Right now there is a lot of
ISP centralization and the move of some of that traffic to public resolvers
potentially decreases centralization at the margin. I certainly don't agree
with citing draft-arkko, which is not at all a neutral or factual source,
so this is just a way of incorporating by reference material which doesn't
have consensus.



An increasing number of applications are offering application-specific
>> encrypted DNS resolution settings, rather than defaulting to using only the
>> system resolver. Due to a lack of a standardized discovery mechanism for
>> DoH and Strict DoT servers, applications that do so are currently limited
>> to using hard coded lists of resolvers and a variety of heuristics and
>> resolvers are available in different applications. At the time of writing,
>> efforts to provide standardized signalling mechanisms for applications to
>> also discover the services offered by local resolvers are in progress
>> [I-D.ietf-dnsop-resolver-information]. Note that an increasing numbers of
>> ISPs are deploying encrypted DNS, for example see the Encrypted DNS
>> Deployment Initiative [EDDI].
>>
>
> I'm not sure what the point of this text is, but it seems kind of
> confusing. In particular, it's not the case that the primary reason that
> Firefox uses a hardcoded list is because there is no standardized discovery
> mechanism.
>
>
> To clarify I suggest:
>
> “An increasing number of applications are offering application-specific
> encrypted DNS resolution settings, rather than defaulting to using only the
> system resolver. A variety of heuristics and resolvers are available in
> different applications including hard-coded lists of recognised DoH/DoT
> servers.
>
> There is currently no standardized discovery mechanism for DoH and Strict
> DoT servers so applications that might want to dynamically discover such
> encrypted services are not able to. At the time of writing, efforts to
> provide standardized signalling mechanisms for applications to also
> discover the services offered by local resolvers are in progress
> [I-D.ietf-dnsop-resolver-information]. Note that an increasing numbers of
> ISPs are deploying encrypted DNS, for example see the Encrypted DNS
> Deployment Initiative [EDDI]."
>

I don't object to this text, but what's the point?


Everything after this just seems to pre-empt discussions that are ongoing
> and haven't reached consensus.
>
>
>> Application-specific changes to default destinations for users' DNS
>> queries might increase or decrease user privacy - it is highly dependant on
>> the network context and the application-specific default. This is an area
>> of active debate.
>>
>> In order that users are aware of and can control such changes it is
>> highly desirable that applications
>> * communicate clearly the change in default to users
>> * provide configuration options to change the default
>> * provide configuration options to always use the network provided
>> resolver
>>
>> The IETF is working on a number of issues related to application-specific
>> DNS settings. For example there have been discussions on the IETF ADD
>> mailing list [ADD] and a proposal for a new ABCD working group [ABCD].”
>>
>
>
> The goal here is to make the readers of the document aware of ongoing work
> even where consensus isn’t reached, which I think the first and third
> paragraphs do. The bullet points are meant to raise user awareness so if
> you really feel it necessary I propose changing the text as follows
>
> OLD: “In order that users are aware of and can control such changes it is
> highly desirable that applications"
>
> NEW: “Users will only be aware of and have the ability to control such
> changes if applications provide the following functions:”
>
> Attempting to stick to be factual here rather an asserting anything
> anything about consensus. Please suggest text if you have a better
> description of the issue.
>

My position is you should strike this text, not attempt to rewrite it. In
general, the history of trying to neutrally document controversial issues
in IETF is not very encouraging, and in this case it's quite unnecesary.

-Ekr


> Sara.
>
>
>