Re: [DNSOP] Draft for dynamic discovery of secure resolvers

Paul Vixie <paul@redbarn.org> Wed, 22 August 2018 16:42 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77876128CE4 for <dnsop@ietfa.amsl.com>; Wed, 22 Aug 2018 09:42:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bR5QtuEwGegN for <dnsop@ietfa.amsl.com>; Wed, 22 Aug 2018 09:42:07 -0700 (PDT)
Received: from family.redbarn.org (family.redbarn.org [IPv6:2001:559:8000:cd::5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 07A6D128CF2 for <dnsop@ietf.org>; Wed, 22 Aug 2018 09:42:07 -0700 (PDT)
Received: from [IPv6:2001:559:8000:c9:9061:ce0d:93bf:336d] (unknown [IPv6:2001:559:8000:c9:9061:ce0d:93bf:336d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id 16452892C6; Wed, 22 Aug 2018 16:42:05 +0000 (UTC)
Message-ID: <5B7D9259.2010403@redbarn.org>
Date: Wed, 22 Aug 2018 09:42:01 -0700
From: Paul Vixie <paul@redbarn.org>
User-Agent: Postbox 5.0.25 (Windows/20180328)
MIME-Version: 1.0
To: Ted Lemon <mellon@fugue.com>
CC: Bob Harold <rharolde@umich.edu>, IETF DNSOP WG <dnsop@ietf.org>, Vittorio Bertola <vittorio.bertola@open-xchange.com>, David Conrad <drc@virtualized.org>
References: <CAC=TB13mUH2SDxFb4c3rOz0-Z6PE_r9i84_xK=dmLxiVr45+tA@mail.gmail.com> <CAC=TB125M81nwiCTNr8Vbee+Z7Fh_3L+6EdZ8evXVzP-2ji4fg@mail.gmail.com> <CAPt1N1n9hDUZQ-Ltvs73T20=fpG-FR_j-t4m0kMapDiv2Us1kw@mail.gmail.com> <5B78BFB9.40103@redbarn.org> <47508D79-0D49-4F31-9BA6-6DC80C38F1DE@cable.comcast.com> <ad1f6dff-ebcc-97a9-6f4b-1ed683827cc7@dougbarton.us> <1313743534.13562.1534765718802@appsuite.open-xchange.com> <9AFE57A7-1D27-4F86-9013-E3C63E63C582@hopcount.ca> <5B7AE322.3020201@redbarn.org> <CAPt1N1m-Xd-7rvgmk8GOsx34=1hsu76nmTgW-8krC3JF7i57KQ@mail.gmail.com> <265867956.15518.1534783313366@appsuite.open-xchange.com> <CAPt1N1myrdOywur35rXRab2QCrhFiJ0vS4wnT_Pof0epdOPz7A@mail.gmail.com> <471139805.18285.1534847636363@appsuite.open-xchange.com> <FBE862C5-6999-4D2F-A877-4ACDF1F5FBF1@virtualized.org> <CA+nkc8CnZB6-0+xqEcU93fFTPHDyMjfNKzj8oMG7OB9sZfbAzA@mail.gmail.com> <CAPt1N1=Ot11V8rUtKU64SLqhf5KZA0cpU=Xy1mSO6D8zj3OzEg@mail.gmail.com>
In-Reply-To: <CAPt1N1=Ot11V8rUtKU64SLqhf5KZA0cpU=Xy1mSO6D8zj3OzEg@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/_vJoXfpvptNsESMRMdu3jX6qZOU>
Subject: Re: [DNSOP] Draft for dynamic discovery of secure resolvers
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2018 16:42:09 -0000

this will be my last post on this topic; happy to continue on DHCP matters.

Ted Lemon wrote:
> ... In fact, though, the people who are currently providing DoH service
> actually have much greater visibility into the malware problem than you
> possibly can. ...

this is a false equivalence.

i have responsibility for my network's security. the DoH provider does not.

i _will_ know what's targetting me. the DoH provider _might_ know.

i know my policies and tradeoffs. the DoH provider will not know.

if i choose to outsource my perimeter defense, that's one thing. but to 
have a visitor or BYOD or malware or employee or family member decide to 
do this, is quite another.

the DoH team has badly misunderstood a full segment of the community, 
and the resulting knee-jerk ignorant politics-based engineering is going 
to have a very long tail of foreseeable negative side effects.

-- P Vixie