[dnsext] Re: Privacy vs EDNS Client IP...

Nicholas Weaver <nweaver@ICSI.Berkeley.EDU> Wed, 03 February 2010 01:43 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B2C1328C117; Tue, 2 Feb 2010 17:43:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.765
X-Spam-Level:
X-Spam-Status: No, score=-5.765 tagged_above=-999 required=5 tests=[AWL=-0.717, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lKLP96DpwpDd; Tue, 2 Feb 2010 17:43:20 -0800 (PST)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id 4B4BC28C139; Tue, 2 Feb 2010 17:43:20 -0800 (PST)
Received: from majordom by psg.com with local (Exim 4.71 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1NcUBr-0006U6-VF for namedroppers-data0@psg.com; Wed, 03 Feb 2010 01:37:59 +0000
Received: from [192.150.186.11] (helo=fruitcake.ICSI.Berkeley.EDU) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.71 (FreeBSD)) (envelope-from <nweaver@ICSI.Berkeley.EDU>) id 1NcUBp-0006Ti-KH for namedroppers@ops.ietf.org; Wed, 03 Feb 2010 01:37:57 +0000
Received: from [IPv6:::1] (jack.ICSI.Berkeley.EDU [192.150.186.73]) by fruitcake.ICSI.Berkeley.EDU (8.12.11.20060614/8.12.11) with ESMTP id o131bYgx029285; Tue, 2 Feb 2010 17:37:34 -0800 (PST)
Subject: [dnsext] Re: Privacy vs EDNS Client IP...
Mime-Version: 1.0 (Apple Message framework v1077)
Content-Type: text/plain; charset="us-ascii"
From: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>
In-Reply-To: <6e04e83a1002021619s15c3972fi96f48ec8ba93b428@mail.gmail.com>
Date: Tue, 02 Feb 2010 17:37:34 -0800
Cc: Nicholas Weaver <nweaver@ICSI.Berkeley.EDU>, John Payne <john@sackheads.org>, Roy Arends <roy@nominet.org.uk>, Wilmer van der Gaast <wilmer@google.com>, namedroppers@ops.ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <E9F25F1D-483C-4A4A-8CB3-178CBB549217@ICSI.Berkeley.EDU>
References: <7c31c8cc1001271556w4918093er6e94e07cb92c4dc4@mail.gmail.com> <973B1F15-E822-491E-89BF-F09FC7E67509@ICSI.Berkeley.EDU> <6e04e83a1002011109u1cd55c99k8b584648184cdc73@mail.gmail.com> <162E0DB1-EC86-4206-AB36-6FEFA786B24C@ICSI.Berkeley.EDU> <6e04e83a1002011402u395f599g74180d28fdbe5707@mail.gmail.com> <D8848FB8-3523-4580-A93F-764494531788@ICSI.Berkeley.EDU> <6e04e83a1002011640t1b637e30gd7d0150eeb0fae8d@mail.gmail.com> <E9A13A5C-73A7-4F66-9617-482551A9BA84@ICSI.Berkeley.EDU> <6e04e83a1002021155kcb908b1v71d362e03e7c4002@mail.gmail.com> <AB78D628-8A01-4742-B32A-90FC6806201E@ICSI.Berkeley.EDU> <6e04e83a1002021619s15c3972fi96f48ec8ba93b428@mail.gmail.com>
To: Ted Hardie <ted.ietf@gmail.com>
X-Mailer: Apple Mail (2.1077)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

My last comments on this:

On Feb 2, 2010, at 4:19 PM, Ted Hardie wrote:
> With an opt-out only mechanism, we also have no way to judge how many of the
> customers would voluntarily give their data to get the better performance; it
> might be the overwhelming majority.  But you are treating opt-in as a complete
> non-starter; if you had not, you and I could be talking about how to create
> informed consent from the user to the authority instead.  As I said before,
> I would be fine with this as an opt-in; that enables the users to retain
> their current levels of privacy by default.


If opt-in is engineered in the PROTOCOL, it really is a non-starter, because opt-in in the protocol requires changing stub resolvers, and if we change stub resolvers, there are far better changes to make first.

My preferred one would be eliminating recursive resolvers entirely from the protocol's usage for anything that the stub resolver can't verify with DNSSEC with a chain of trust from a signed root: the recursive resolver is a proven security and privacy threat that should be eliminated from the architecture entirely. 



If opt-in is not assumed by an already made explicit choice of resolver when such a feature already complies with the existing terms of service, there is no benefit:  OpenDNS and Google Public DNS have gone out of their way to advertise particular "set your DNS here" addresses.  That goes out the window.  So why bother developing this further, since these are the parties who want it, and who have invested a large amount of time and effort into advertising these IP addresses?


Basically, neither of your opt-in choice can work.


So I think we can conclude there is a fundamental difference: 

You believe there are a significant number of users who

a)  Deliberately chose a third party resolver

b)  Chose the third party resolver to somehow prevent information leakage

and that if these can't be accomidated, you don't want the protocol.


I believe that

a)  Most users who chose a third party resolver did not do so for privacy reasons, and are already covered under a contractual relationship with the third party resolver which would enable this feature under the existing terms of service

b)  Those who did, even in the current infrastructure, made a very poor decision that does not significantly enhance their privacy and, if anything, significantly degrades their privacy protections.

And therefore the significant benefit to all the other users of third party resolvers, and the ability to make sure that third party resolvers both work with CDN-style DNS and don't have barriers to entry is far more useful than preserving what privacy protection may be lost.


>> And you seem to be missing my point:  For users of 1st party resolvers, this information or something semantically equivalent is already being leaked to ALL authorities.
>> 
> 
> We agree; it is possible to configure a system so that this does not leak,
> but those who use a resolver on their system or very close to it are leaking
> this data now.

Why do you think that using a third-party resolver is a good solution for privacy protection?  Any savings you get by having some requests cached and some requests through their resolver address are lost by giving your entire request stream to companies which specifically states it has the right to datamine the results in the terms of service.  

For at least one major provider, Google, the ability to datamine the query stream is the ONLY revenue source!


>> Such zone-transfer like mechanisms would undoubtedly be constrained by pairwise agreements between authorities and third-party resolvers, because there is BOTH secret sauce issues and load issues.
>> 
>> So do you really want to ingrain contractual-behavior affecting performance into DNS!?!?  Do you really want contractual barriers to entry for 3rd party DNS services?
>> 
>> 
> 
> You seem to want to rely on contractual language between 3rd party servers
> and their clients.  If 3rd party resolver X doesn't bother getting data from
> CDN Y, they are no worse off than now.  They can opt-in to it, just as they
> can opt-in to sending client IPs; the amount of data and work are different,
> but so is the customer experience.

I want to take advantage of existing contractual relationships between the client and third-party resolvers, yes.  Why create a new mechanism when existing mechanisms will suffice?  How much opt-in is enough?

I don't want to create an incentive for contractual relationships between CDNs and third party resolvers, because that will create barriers to entry for anyone else wanting to do "better DNS"

> The key question is who should be sending data to whom?  Does the CDN
> reveal data in bulk to interested resolvers?  Or does the resolver reveal
> data en masse to authorities?

No CDN, because of secret sauce concerns, will reveal the data to ALL interested resolvers:  This is saying "support zone transfers"-type logic to everyone.  Can you believe ANY CDN would do such a thing?  We've gone through years of advice of "disable zone transfers", and now you'd want the CDN's to enable-zone transfer equivelents?

Thus they would ONLY reveal data to pairwise agreements, which creates barriers to entry for other third party resolvers.

Do you really want to ensure that the only solution is anticompetitive?  

> I don't understand how your point about web analytics/scale relates to
> which problems
> the WG is chartered for.  But please don't worry about it; that
> particular tendril of
> fog doesn't need much blowing away.

Yes it does:  All costs are relative.  You don't go fretting about $1 budget items if you have $1M problems.  

The scale of the problem from APIs and analytics is so much greater than the information leakage you'd generate if you generated all requests through a resolver on your computer (which is far more leakage than you are worried about here).  For those who don't think its a problem, do a search in your cookie store for __utma.  Or run an IDS and look at all the "fetches" for images to google-analytics.  And content yourself with the fiction that google does not consider the IP address PII for the purpose of analytics...

Until you are running techniques to block analytics, APIs, etc, who cares about if DNS starts leaking the subnet you are on when you are using a third-party resolver, only to the authorities for the names you are query, and that already reserved the right to datamine "aggregate" query streams?