Re: [dnsext] Re: I-D ACTION:draft-vandergaast-edns-client-ip-00.txt

Paul Hoffman <paul.hoffman@vpnc.org> Mon, 01 February 2010 16:10 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 54C1B28C180; Mon, 1 Feb 2010 08:10:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.355
X-Spam-Level:
X-Spam-Status: No, score=-106.355 tagged_above=-999 required=5 tests=[AWL=0.244, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zevffTaXzjm4; Mon, 1 Feb 2010 08:10:43 -0800 (PST)
Received: from psg.com (psg.com [147.28.0.62]) by core3.amsl.com (Postfix) with ESMTP id E1F5E28C163; Mon, 1 Feb 2010 08:10:42 -0800 (PST)
Received: from majordom by psg.com with local (Exim 4.71 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1NbylO-0001wK-Cr for namedroppers-data0@psg.com; Mon, 01 Feb 2010 16:04:34 +0000
Received: from [192.245.12.227] (helo=balder-227.proper.com) by psg.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.71 (FreeBSD)) (envelope-from <paul.hoffman@vpnc.org>) id 1NbylL-0001s7-Nu for namedroppers@ops.ietf.org; Mon, 01 Feb 2010 16:04:31 +0000
Received: from [10.20.30.158] (75-101-30-90.dsl.dynamic.sonic.net [75.101.30.90]) (authenticated bits=0) by balder-227.proper.com (8.14.2/8.14.2) with ESMTP id o11G4SKB033388 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 1 Feb 2010 09:04:29 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
Mime-Version: 1.0
Message-Id: <p062408d2c78cabca3310@[10.20.30.158]>
In-Reply-To: <20100201145746.GA29691@tigger.mamista.net>
References: <7c31c8cc1001271556w4918093er6e94e07cb92c4dc4@mail.gmail.com> <6e04e83a1001281107r470b104dj5d3b66919ce69977@mail.gmail.com> <7c31c8cc1001281125l2605b5d0tc528abdb2d35a48@mail.gmail.com> <6e04e83a1001281155y8961ddfy763d4f79d5d45c3f@mail.gmail.com> <4C393F4E-4DAF-4514-ACE4-E0DBB8C63B34@icsi.berkeley.edu> <4B66E625.2070708@nic.cz> <20100201145746.GA29691@tigger.mamista.net>
Date: Mon, 01 Feb 2010 08:04:25 -0800
To: Martin Barry <marty@supine.com>, namedroppers@ops.ietf.org
From: Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [dnsext] Re: I-D ACTION:draft-vandergaast-edns-client-ip-00.txt
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>
List-Unsubscribe: To unsubscribe send a message to namedroppers-request@ops.ietf.org with
List-Unsubscribe: the word 'unsubscribe' in a single line as the message text body.
List-Archive: <http://ops.ietf.org/lists/namedroppers/>

At 1:57 AM +1100 2/2/10, Martin Barry wrote:
>$quoted_author = "OndÞej Sur˜" ;
>>
>> On 28.1.2010 21:19, Nicholas Weaver wrote:
>> >The client has ALREADY given up the privacy to the third party DNS
>> >resolver, the additional privacy leakage thereafter would be trivial.
>>
>> I strongly disagree with this statement.  You can have all sorts of
>> agreements with third party DNS resolver provider, including privacy
>> agreement, etc.  This is one-to-one relationship.  On the other hand
>> giving your IP address (or netblock) to random third party
>> authoritative DNS providers is a different thing in my view, since
>> you give your IP address/netblock to every-typo-you-make
>> authoritative DNS server.
>
>I'm not sure I understand this concern.
>
>A DNS request is usually followed by a connection from an application.
>
>Given that the edns-client-ip option in the draft would apply a netmask,
>surely that is providing less information to the service operator than the
>subsequent connection to their service.

This assumes that they system that is making the DNS request is the one that is about to make the connection. That is the common, but not universal, case.

--Paul Hoffman, Director
--VPN Consortium