[DNSOP] Re: Comments from IETF Last Call about draft-ietf-dnsop-structured-dns-error
tirumal reddy <kondtir@gmail.com> Wed, 07 May 2025 07:53 UTC
Return-Path: <kondtir@gmail.com>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id DE65B25C5F17; Wed, 7 May 2025 00:53:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iPNHzlTDhVcG; Wed, 7 May 2025 00:53:36 -0700 (PDT)
Received: from mail-ej1-x62b.google.com (mail-ej1-x62b.google.com [IPv6:2a00:1450:4864:20::62b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id A8B2125C5F08; Wed, 7 May 2025 00:53:36 -0700 (PDT)
Received: by mail-ej1-x62b.google.com with SMTP id a640c23a62f3a-acb615228a4so134789566b.0; Wed, 07 May 2025 00:53:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1746604416; x=1747209216; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=lHLZ/h4z0JMt+9h6gywI91qUWDuU744LfciOtvMucSg=; b=HF99vZbdWJGrsxthK0yifLpRO8B0Xxt0R3kLgrJ3fFt0r8qfgCCqJyWVgAEzh32ngP Ch1MYq8JhoT1cfgeTofpo989ESFiAGWEyFejLpRCIT3YBlS14ToV8o1dQOcNAgFbZNmj j5u1pBA/sRDSkNEEMfxa758TtljDxV63BnZUw5niBS6mO31YorXFUdJhSshrmACO5btk DRUyDetB+Wsqw0nLOPhYD0X909bg5yWJpQwdndfRQBvDfECbh921iKmmz7jHYYj9vBek oKYEyKYIRLoSQaNySGuQkwu0IpioUGAoTDmhhQxp1FQT0Pay5icK7Ikr8c+MuOB0nC5n p8Gg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1746604416; x=1747209216; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=lHLZ/h4z0JMt+9h6gywI91qUWDuU744LfciOtvMucSg=; b=L9P+uimMSKrO+VXPGG8m1XBh87qITps4q9UPxb8HMVhLbGgpOh7nAFwOrYdEqidp1S HEoTPcGKozuFSzQjlDAiBRNmU3KyDqC6MNTzlodbm0mFFSc3Up0QLMkejuC791PFc7mC R7VAUgSC1OuLET+Z0wLDOts9rUaGLdc+ylr6bKF9Uhqq/t1EgNObFpai3lrM3a3w/JVv 0T5gK1qMk8dBSmWAGRmHHPcMXN6su07Hs0b0rRAubYMFiNY792lEbc8JYxcQYOJ3Dwfp HMWjKJMkRVJlcBNHvKBnE3xeDIBmdy+/RsuozmwrH2LFM2jHQD9wur0Pt5J5GXeoGbLN HJ9g==
X-Forwarded-Encrypted: i=1; AJvYcCVGMWBSflJ76DhHyyemTg9lmLkeY0gNpr0G2f2G13MAMHbKmR8awLJLogLa9SSc+LcmqnTgsQ==@ietf.org, AJvYcCXPMQt9aFTXOJUF9CINQ8T4U+CVfukXa8ArZY9QLDz3pFcXWoZWIYpUvyLS1eEHf9ha5nATQso/Kyxb@ietf.org
X-Gm-Message-State: AOJu0YydfXbEu7EAdOiPNutfF6cVNLKT7LQ9/IqOwqZqJFJpHbdzirLb 1dFqXwYaqRQQL4sn5aMCvNeBysrO2qOnJp0nVPmmVWS/5mtu91bwpY331YQutGbEdVs4nt6toxF 3xZ3IpVRevKfZN3UCSJS9Sen5yYg=
X-Gm-Gg: ASbGncsDZNNMhXlcBdtnOuVVNaG2/8OsV/FnCOFLo+7+nS080PnMrhkpdpAnPhaVH4i iuaotSUQDPyJcx1yHwgi2ChflkfCP8f7OqjYKFNu6SLItXa7piEXPOrVRYzJvx0Ygzrhb4Wm2av 7f26LrQPF5CQ/XiVNrm9bK5dnB
X-Google-Smtp-Source: AGHT+IH5mJ/xp9zEgiApZyIDfSxjw0AMuM2jhZsXQs16gXSt155AgzMVOn6Ao8XwfEK7UrOI2G39+2qhsoopTpuJ2nI=
X-Received: by 2002:a17:907:a60b:b0:ad1:8e6f:3ad8 with SMTP id a640c23a62f3a-ad1eafbfd7amr171221966b.14.1746604415175; Wed, 07 May 2025 00:53:35 -0700 (PDT)
MIME-Version: 1.0
References: <PH0PR11MB49666C9FAA1DC4C04EB7AEDBA98E2@PH0PR11MB4966.namprd11.prod.outlook.com> <aBjCctAUGms4Tqil@nic.fr> <be02a1b9-99f7-a603-c7b7-ce009850f245@nohats.ca> <CAFpG3gfqa4DD5qRGiz-x20AmpqZeHS3bLc5qyh6jf=EMfDvpbA@mail.gmail.com> <a39cdd21-b128-73b3-4445-d03c31bb8096@nohats.ca>
In-Reply-To: <a39cdd21-b128-73b3-4445-d03c31bb8096@nohats.ca>
From: tirumal reddy <kondtir@gmail.com>
Date: Wed, 07 May 2025 13:22:58 +0530
X-Gm-Features: ATxdqUGMGogNKkPJyTbkOf3S-V95GNmRgW7A9Gm7NnLHdvQl7vBkEesgtnRWrxQ
Message-ID: <CAFpG3gegutcvCQbz4rWG1X6sXNAAXBu9gBYF79KSRj66VxSbSg@mail.gmail.com>
To: Paul Wouters <paul@nohats.ca>
Content-Type: multipart/alternative; boundary="000000000000bad41a0634870757"
Message-ID-Hash: KZ34CD2XFTWZUJ7WO44GL7LWH7BQBMA5
X-Message-ID-Hash: KZ34CD2XFTWZUJ7WO44GL7LWH7BQBMA5
X-MailFrom: kondtir@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Stephane Bortzmeyer <bortzmeyer=40nic.fr@dmarc.ietf.org>, "Eric Vyncke (evyncke)" <evyncke=40cisco.com@dmarc.ietf.org>, "dnsop@ietf.org" <dnsop@ietf.org>, last-call@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: Comments from IETF Last Call about draft-ietf-dnsop-structured-dns-error
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/P9rfvHN-79XXC4o8JHFOSASFRGA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>
Hi Paul, Please see inline On Tue, 6 May 2025 at 19:23, Paul Wouters <paul@nohats.ca> wrote: > On Tue, 6 May 2025, tirumal reddy wrote: > > > I am not sure why a JSON object for a browser would produce a more > > "meaingful error message" than one that is possible with RFC 8914 ? > > > > It is designed for clients to interpret and render meaningful, > user-friendly messages. This approach has already seen adoption, such as > in AdGuard’s DNS SDE > > extension, which shows how structured DNS error reporting can enhance > end-user communication. > > I disagree. An ENUM can be handled by browsers to display text in the > locality of the user. This can just fling up a free text English > message, that you expect browsers to validate for potential harm > before displaying to the user. You are subcontracting out the > security risks you are introducing. > To clarify, the sub-error attribute, being an ENUM, can be rendered without interpretation and is suitable for localization and consistent handling across clients. For other fields, specific restrictions are imposed to avoid the risks associated with displaying its content. > > > The risks associated with displaying attacker-provided contact details > are already addressed in the draft > > (see > https://www.ietf.org/archive/id/draft-ietf-dnsop-structured-dns-error-15.html#section-10.2) > The draft explicitly states that displaying the "c" field is not > > mandatory and outlines conditions under which it may be shown. While a > home admin or IT department may already know the resolver’s contact > details, other users on > > the network often do not. Providing contact information in structured > form improves ease-of-use, allowing users to report filtering errors > without having to > > independently search for their ISP’s or administrator’s support details. > > Ease of use for which users? Please tell me which of these users will > use this contact information: > > 1) Paul using a mobile phone, maybe connected to wifi or LTE. > 2) Paul using a mobile phone, at home using a default CP from his ISP > 3) Paul using a mobile phone, at home using his own stuff - he is a geek > 4) Paul using a mobile phone, at starbucks, mall or airplane > 5) Paul using a mobile phone, as BYOD at work > 6) Paul using a mobile phone, in his hotel room > 7) Paul using a Desktop at home > 8) Paul using a Desktop at work You are questioning a long-standing practice of providing contact details in HTTP(S) block pages to assist users. This isn’t new or experimentan, it’s a well-established and widely deployed pattern. Resolvers that present block pages include contact information by default. In fact, I’m not aware of any major resolver offering block pages that does not include such details. For instance, see real-world examples like OpenDNS block page <https://answers.microsoft.com/en-us/windows/forum/all/opendns-has-blocked-my-main-sites-on-my-main/66b53344-7f01-4daa-998f-b1c6be295873> and Quad9’s collaboration <https://devops.com/criminal-ip-and-quad9-collaborate-to-exchange-domain-and-ip-threat-intelligence/> where users are directed for support or further action. Structured DNS error reporting simply standardizes this practice, with clear restrictions on when the "c" field should be displayed to the end-user. > > Tell me in which of these scenarios the contact info should be > displayed. Then do the same for Paul, now elderly at 90 years of > age, and not really understanding how is phone or desktop connects > to the internet at all. > For elderly users, it’s unlikely they would contact anyone directly, but family members or caregivers assisting will benefit from the structured information to report the problem or educate the elderly not to visit the blocked domain as it is bad. > > > The text "malware present for 23 days" and "example.net Filtering > Service" > > could have already been placed in the EXTRA-TEXT field as per > RFC8914. > > > > > > The draft further states: > > > > Whether the information provided in the "j" name is > meaningful > > or considered as garbage data (including empty values) is > local > > to each IT teams. > > > > > > The draft seems the cherry-pick whether the content is meant for > > endusers ("to eliminate the need to "spoof" block pages for HTTPS > > resources") or when it is meant for IT teams. I think IT teams can > > figure out who admins a DNS resolver on a certain IP already. The > > non-admins are just vulnerable to misinformation. > > > > > > Relying solely on the EXTRA-TEXT field to carry "j" would prevent > carrying other structured fields intended for both IT admins and end-users. > This is precisely why > > separating structured information into dedicated fields is necessary to > allow selective display to end-users and logging for IT admins. > > I am fine with more enum's helping categorize why an answer is withheld. > I am having a problem with the EXTRA-TXT. > > If an IT admin cannot find out who is responsible for a DNS filter, they > should probably switch DNS filter vendors. Worse, if their DNS service > providing this is compromised, they can't even trust it anyway. They > need to use their own resources and documentation, and not the network > provided one. I think claiming this is useful for non-endusers is just > not realistic. Which leaves us with endusers which means anything > displayed can and will be abused by attackers to manipulate vulnerable > endusers. > > I see the main concern from an ISP being "It looks like we are broken > but we are merely following instructions (from government or the > commercial serivce opted in by the enduser) to filter/block a DNS > request". > IT admins typically know their resolver’s support contact details. The "j" field helps them identify the exact reason a domain was blocked without needing to contact the resolver’s helpdesk. For example, if a domain is blocked because it is unclassified or misclassified, and the IT team sees multiple users accessing it for legitimate reasons, they can create an explicit allow rule and raise a ticket with the resolver’s helpdesk. > > So for that, ENUMs are enough and save to convey. And browsers can > translate enums for the user. Eg: > > FILTERED_BY_DEVICE_REGULATORY > FILTERED_BY_DEVICE_USER_OPTIN_ADULT > FILTERED_BY_DEVICE_USER_OPTIN_ADBLOCKER > FILTERED_BY_ISP_REGULATORY > FILTERED_BY_ISP_USER_OPTIN_MALWARE > The draft has already added a registry to update the enum in future specifications. Cheers, -Tiru > > etc. > > > > > > And this: > > > > This approach thus avoids the need to install a local root > > certificate authority on those IT-managed devices. > > > > Is clearly targetting endusers. > > > > > > I believe this document is actually harmful to endusers, with no > > meaningful gains for IT teams. If I was a browser vendor, I would > > only allow displaying i18n text for EDE enums. > > > > > > please elaborate how it is harmful to end-users. > > I've tried to explain this two times now. I hope this helps. Note that > it might also be helpful to read the below text where I explain how > Mark was trying to reduce the harm caused by your draft, but how I feel > it is still (too) dangerous to use freefom text ask Mark proposed. > > Paul > > > Cheers, > > -Tiru > > > > > > > > Now Mark Nottingham does a fair attempt at trying to contain the > > problem of display free text for the enduser in > draft-nottingham-public-resolver-errors > > by constraining the EXTRA-TEXT to just two IDs that map to a DNS > > provider and an incidence number. But that will lead us back to > > attacker induced spoof pages, eg: > > > > The network / attacker does a: > > > > - redirecting major IPs port 53 to itself (eg 1.1.1.1, 8.8.8.8, > 9.9.9.9) > > (and block DoT, DoH, DoQ) > > - issuing DHCP DNS servers to itself. > > - transparently run all port 53 through its own resolver. > > > > then: > > > > - Use a globally trusted ID from the DNS Resolver Identifier > Registry, eg > > the one from Google DNS. > > - Generate a filtered response with Extended DNS Error Code 17 > (see [RFC8914]) > > and an EXTRA-TEXT field containing: > > > > { > > "ro": "GoogleDNS", // or whatever they would have registered > at IANAA > > "inc": "abc123" // or whatever format Google DNS would use > > } > > > > Let's assume Google DNS has registered the template: > > > > > https://resolver-report.dns.google.com/filtering-incidents/{inc} > > > > then additionally: > > > > - resolve resolver-report.dns.google.com to itself. > > - generate some self signed cert for > resolver-report.dns.google.com > > - publish malicious / advertising content on any URL on > resolver-report.dns.google.com > > > > > > Since captive portals have already desensitized users into > accepting > > spoofed pages, this will still trick a percentage of users into > going > > to a malicious site (even if one cannot make it clickable, the text > > can lure people to open a new tab/window and type in the name of > the > > website conveyed in the error msg, eg "visit www.fbi-arrests.io to > > avoid an arrest warrant for trying to browse illegal content"). > > > > Furthermore, the incidents number can be customized for tracking or > > deanonimising a user (eg one using Private Relay / MASQ). It would > be > > much better from a privacy perspective to only allow the QNAME to > be > > the incident number. > > > > Note also that RFC 8914 warns of the dangerous of EXTRA-TEXT > causing DNS > > fragmentation when messages are used that are too long. > > > > Mark's draft also causes more centalization of "well known/trusted > DNS > > servers". > > > > > > I would suggest that instead of these solutions, > draft-ietf-dnsop-structured-dns-error > > restricts itself to extend the ENUMs to cover most cases, and > leave the > > user / browsers to try and give more details errors, without the > IETF > > centralizing it using an IANA Registry. I would like it to > deprecate > > EXTRA-TEXT. > > > > If some kind of extra text option is _really_ needed, then extend > RFC > > 9606 resinfo with a template field that points to the resolver > operators > > extended error website, that browsers can use by filling in the > template > > URI with only the QNAME as option so it is guaranteed each user > trying > > to go to the same blocked domain gets the same error message and > cannot > > be deanonimized or tracked. > > > > Paul > > > > _______________________________________________ > > DNSOP mailing list -- dnsop@ietf.org > > To unsubscribe send an email to dnsop-leave@ietf.org > > > > > > >
- [DNSOP] Re: Comments from IETF Last Call about dr… Stephane Bortzmeyer
- [DNSOP] Comments from IETF Last Call about draft-… Eric Vyncke (evyncke)
- [DNSOP] Re: Comments from IETF Last Call about dr… Stephane Bortzmeyer
- [DNSOP] Re: Comments from IETF Last Call about dr… Petr Špaček
- [DNSOP] Re: Comments from IETF Last Call about dr… Paul Wouters
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: Comments from IETF Last Call about dr… Peter Thomassen
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: Comments from IETF Last Call about dr… Peter Thomassen
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: Comments from IETF Last Call about dr… Paul Wouters
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: [Last-Call] Re: Re: Comments from IET… Paul Wouters
- [DNSOP] Re: [Last-Call] Re: Re: Comments from IET… Eric Rescorla
- [DNSOP] Re: Comments from IETF Last Call about dr… S Moonesamy
- [DNSOP] Re: Comments from IETF Last Call about dr… S Moonesamy
- [DNSOP] Re: Comments from IETF Last Call about dr… David Adrian
- [DNSOP] Re: [Last-Call] Re: Re: Comments from IET… tirumal reddy
- [DNSOP] Re: [Last-Call] Re: Re: Comments from IET… tirumal reddy
- [DNSOP] Re: [Last-Call] Re: Re: Comments from IET… Paul Wouters
- [DNSOP] Re: Comments from IETF Last Call about dr… Petr Špaček
- [DNSOP] Re: Comments from IETF Last Call about dr… Petr Špaček
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] DNS, censorship, attacks and centralizati… Mark Nottingham
- [DNSOP] Re: Comments from IETF Last Call about dr… Petr Špaček
- [DNSOP] Re: DNS, censorship, attacks and centrali… Bill Woodcock
- [DNSOP] Re: DNS, censorship, attacks and centrali… Jens Finkhäuser
- [DNSOP] Re: DNS, censorship, attacks and centrali… Ben Schwartz
- [DNSOP] Re: DNS, censorship, attacks and centrali… Mark Nottingham
- [DNSOP] Re: Comments from IETF Last Call about dr… tirumal reddy
- [DNSOP] Re: DNS, censorship, attacks and centrali… Mark Nottingham
- [DNSOP] Re: DNS, censorship, attacks and centrali… S Moonesamy