Re: [dnsext] need new flag bit in EDNS, "do me no favours" (DMNF)

Phillip Hallam-Baker <hallam@gmail.com> Sun, 24 October 2010 22:28 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 99F8F3A6774; Sun, 24 Oct 2010 15:28:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.292
X-Spam-Level:
X-Spam-Status: No, score=-2.292 tagged_above=-999 required=5 tests=[AWL=0.306, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s-g9D2d6RABc; Sun, 24 Oct 2010 15:27:59 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id C76BB3A6452; Sun, 24 Oct 2010 15:27:58 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.72 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1PA8zx-000PEV-NO for namedroppers-data0@psg.com; Sun, 24 Oct 2010 22:25:05 +0000
Received: from mail-yx0-f180.google.com ([209.85.213.180]) by psg.com with esmtp (Exim 4.72 (FreeBSD)) (envelope-from <hallam@gmail.com>) id 1PA8zt-000PDr-OI for namedroppers@ops.ietf.org; Sun, 24 Oct 2010 22:25:02 +0000
Received: by yxk30 with SMTP id 30so2158875yxk.11 for <namedroppers@ops.ietf.org>; Sun, 24 Oct 2010 15:25:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:cc:content-type; bh=zTPjeTEt1ITiTrY+21IyHN+TsXjldftymkeISp23Na0=; b=IyW/C5lvyrnDz5G2ncf8B+a9GZC7kbt/3qnkHzqzDzlAHKqZCXxDDik9jelHGc1vZa 24fB1+r8IoyNQpPnKhTxi2GTQhoQWNQioOcx+Cvj1T5c4gVpkBf9JVR6hI+3VPihjEsu m3LRUeR3iNGYkuzJklAvKqG+q8EfTCKwDykds=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=edwZ5p23zuhppmGFxZzhwU6E4vzs7qrjLRN/BH+czNZLAnmYIUbyr16zp/HaCOYhAs NwXnFPWco6BSY3qJJHFMC1uTnO9KV3i3aCnqFTjZpmimciaYCct9TA+lN07rtL4mQcDJ ZEBbtUzSGs/qMtA+cndo7IJa561zjBNrA6hn8=
MIME-Version: 1.0
Received: by 10.100.105.16 with SMTP id d16mr4053495anc.219.1287959100604; Sun, 24 Oct 2010 15:25:00 -0700 (PDT)
Received: by 10.100.41.14 with HTTP; Sun, 24 Oct 2010 15:25:00 -0700 (PDT)
In-Reply-To: <62693.1287942567@nsa.vix.com>
References: <59023.1287939121@nsa.vix.com> <AANLkTinGvVvjrbrs_0ZwAxUOR-SpCTnike_JqWRTRbSZ@mail.gmail.com> <62693.1287942567@nsa.vix.com>
Date: Sun, 24 Oct 2010 18:25:00 -0400
Message-ID: <AANLkTimUVDeecq+w9MRp4LjAduLPVW8SFeCyiu6goVE+@mail.gmail.com>
Subject: Re: [dnsext] need new flag bit in EDNS, "do me no favours" (DMNF)
From: Phillip Hallam-Baker <hallam@gmail.com>
To: Paul Vixie <vixie@isc.org>
Cc: namedroppers@ops.ietf.org
Content-Type: multipart/alternative; boundary="0016e644cef4ad3fdf04936458dd"
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

I think that the probability of this being implemented or respected on
either end is low.

Applications will set the bit without asking the user and that will give the
DNS providers all the justification they need to ignore it.

I also think that the range of policy options needs to be richer than a
single bit. Many people are happy to accept advertising if they are getting
a real benefit in return. For example, having malware and phishing sites
filtered out. The problem with ISP interception is that the end user does
not get the choice.


I think that what we need to do is to abandon the idea that applications
take DNS service from the nearest DNS resolver. It is a trusted role
regardless of whether DNSSEC is in use or not.

The only sure fire way to avoid these issues is to apply guerilla tactics.
The platform needs to identify the service it is going to connect to in a
way that the user can easily understand - i.e. a DNS name. So to connect
through the Comodo Group Inc. curated DNS, you would type in 'comodo.com' as
your DNS resolver. Or for Google it would be google.com.

There might even be different resolver policies on offer. For example there
might be scada.comodo.com on offer for the most restrictive set of
resolution controls and use of that service might have a subscription fee.
That is not a service many people would want to subscribe to at home but
might make a lot of sense for connecting critical infrastructure control
systems to exactly the set of Internet resources that they need to contact
and no more.


In DPLS I propose a mechanism that allows DNS resolvers to advertise a
secure means of connecting via UDP. The architectural principles can be
extended so that the client attempts to connect by UDP if available but will
fall back to using SSL on the HTTPS port if that is blocked.


On Sun, Oct 24, 2010 at 1:49 PM, Paul Vixie <vixie@isc.org> wrote:

> > Date: Sun, 24 Oct 2010 10:34:05 -0700
> > From: Colm MacCárthaigh <colm@allcosts.net>
> >
> > Sounds like an ok idea, though it's hard to see operators honouring the
> bit
> > - but to meet your own burden of relevance; why should the DNS protocol
> be
> > complicated with an EDNS change to facilitate the users of
> shared-resolvers
> > when those users could simply run their own?
>
> if it's a single bit that specifies optional behaviour that some people
> want,
> and it's unlikely to create market pressure on people who have no need for
> it
> on their own but who would have to implement it anyway (as i think is true
> of
> the google proposal for adding stub IP to the recursive/authority q-tuple)
> and
> it's not a layering change (dare i say "violation") as is definitely true
> of
> the google stub-IP proposal, then it's effectively an FYI rather than a
> STD.
>
>


-- 
Website: http://hallambaker.com/