Re: [DNSOP] revisiting outstanding dicusses for 6304bis

Joel Jaeggli <joelja@bogus.com> Tue, 24 February 2015 20:06 UTC

Return-Path: <joelja@bogus.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D61E01A6ED9 for <dnsop@ietfa.amsl.com>; Tue, 24 Feb 2015 12:06:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QlFnjnaFerlb for <dnsop@ietfa.amsl.com>; Tue, 24 Feb 2015 12:06:10 -0800 (PST)
Received: from nagasaki.bogus.com (nagasaki.bogus.com [IPv6:2001:418:1::81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA9121A6EE6 for <dnsop@ietf.org>; Tue, 24 Feb 2015 12:06:10 -0800 (PST)
Received: from [172.31.98.179] ([173.247.207.124]) (authenticated bits=0) by nagasaki.bogus.com (8.14.9/8.14.9) with ESMTP id t1OK66XX082934 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 24 Feb 2015 20:06:08 GMT (envelope-from joelja@bogus.com)
Content-Type: multipart/alternative; boundary="Apple-Mail-C340DCC6-8F18-4C85-809D-A710AAE30DFB"
Mime-Version: 1.0 (1.0)
From: Joel Jaeggli <joelja@bogus.com>
X-Mailer: iPhone Mail (12B466)
In-Reply-To: <CAHbuEH4yRxPZwDNjq8T2bBoPyUp0TaizuftL6HPYfX6eKc92fg@mail.gmail.com>
Date: Tue, 24 Feb 2015 12:06:06 -0800
Content-Transfer-Encoding: 7bit
Message-Id: <7232B70E-D9F3-43BD-9DB1-2908A80E9404@bogus.com>
References: <54A83AFC.4030103@bogus.com> <54EA134D.9020108@bogus.com> <CAHbuEH4t11KvyX-TwW3ZncbA97GEfzvEphaArORsG6hBdZ1ZGg@mail.gmail.com> <F67319C3-66A1-4659-8B12-72F2D5ABBE88@vpnc.org> <CAHbuEH4yRxPZwDNjq8T2bBoPyUp0TaizuftL6HPYfX6eKc92fg@mail.gmail.com>
To: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/JhJn5hTNns2FfRuILq5SM6IsWr8>
Cc: "draft-ietf-dnsop-rfc6304bis@tools.ietf.org" <draft-ietf-dnsop-rfc6304bis@tools.ietf.org>, dnsop <dnsop@ietf.org>, "dnsop-chairs@tools.ietf.org" <dnsop-chairs@tools.ietf.org>, Paul Hoffman <paul.hoffman@vpnc.org>
Subject: Re: [DNSOP] revisiting outstanding dicusses for 6304bis
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 24 Feb 2015 20:06:14 -0000

Working group, 

I would direct your attention to the current discuss, here:

https://datatracker.ietf.org/doc/draft-ietf-dnsop-rfc6304bis/ballot/

Should we consider recommendations with respect to treatment of logging or storage of queries or the extent to which such queries should be protected? 

Thanks
Joel

Sent from my iPhone

> On Feb 23, 2015, at 08:25, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> wrote:
> 
> 
> 
>> On Mon, Feb 23, 2015 at 10:21 AM, Paul Hoffman <paul.hoffman@vpnc.org> wrote:
>> On Feb 23, 2015, at 7:13 AM, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> wrote:
>> > Thanks for bringing this to my attention.  The updated text points out the risk, but it would have been nice seeing it phrased in a way to encourage mitigation of that risk (recommend not to log).  It'd easier to attack a system and gain access to logs than to observe session traffic.
>> 
>> AS112 operators do so for the public benefit. There are very good operational reasons why they *should* log, in order to help find bugs and to provide better service. You are asking that the very tiny chance of a privacy breach should trump that operational benefit.
> 
> As an FYI - I wouldn't put this in the privacy bucket, but rather security as it reveals information about a network that could be used in future attacks against the organization leaking their data. 
>> 
>> The mention of the privacy issue with logging is sufficient, and going further would have negative consequences to the operations of this service.
> 
> Mitigating the risks could be helpful and might mean protecting access to logs in cases where logs must be generated. 
> 
> Thanks,
> Kathleen
>> 
>> --Paul Hoffman
> 
> 
> 
> -- 
> 
> Best regards,
> Kathleen