[DNSOP] adoption mechanics and disclaimers wrt dns-rpz

Paul Vixie <vixie@fsi.io> Sun, 19 March 2017 23:55 UTC

Return-Path: <vixie@fsi.io>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC48C129434 for <dnsop@ietfa.amsl.com>; Sun, 19 Mar 2017 16:55:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fsi.io
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ytW5n6WzgjOJ for <dnsop@ietfa.amsl.com>; Sun, 19 Mar 2017 16:55:41 -0700 (PDT)
Received: from hq.fsi.io (hq.fsi.io [104.244.13.96]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E925129435 for <dnsop@ietf.org>; Sun, 19 Mar 2017 16:55:41 -0700 (PDT)
Received: from localhost (ip6-localhost [IPv6:::1]) by hq.fsi.io (Postfix) with ESMTP id DC62082124B for <dnsop@ietf.org>; Sun, 19 Mar 2017 23:55:39 +0000 (UTC)
Received: from hq.fsi.io ([IPv6:::1]) by localhost (hq.fsi.io [IPv6:::1]) (amavisd-new, port 10032) with ESMTP id IyPHEmN-40wh; Sun, 19 Mar 2017 23:55:37 +0000 (UTC)
Received: from localhost (ip6-localhost [IPv6:::1]) by hq.fsi.io (Postfix) with ESMTP id D2A7A82124A; Sun, 19 Mar 2017 23:55:36 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.9.0 hq.fsi.io D2A7A82124A
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fsi.io; s=9DB368E8-E20A-11E2-82F0-24FC3FFE5E89; t=1489967736; bh=tSriW8TrWDb47mfe2yhaCgCXcEaMeSArP5GIR5QPABw=; h=From:To:Subject:Date:Message-ID:MIME-Version: Content-Transfer-Encoding:Content-Type; b=J8c41DJhXL1e0zkOukk1+GGwTbNOQk8ciFN9t/Dme7tAsqPgi3pDWBqbboHs1RND7 fj0gxweOqijjvtnjGxsb+xUYsGFkHxqpzswbP/SMhunL3YO4MYuZHtR16OjTrzpSDN ArmA2sEGLhQ7QmvkGDgNmBO0tRwzgAeX347EvCwg=
X-Virus-Scanned: amavisd-new at fsi.io
Received: from hq.fsi.io ([IPv6:::1]) by localhost (hq.fsi.io [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id a6XHG-THe0pV; Sun, 19 Mar 2017 23:55:36 +0000 (UTC)
Received: from linux-hs2j.localnet (dhcp-148.access.lah1.vix.su [24.104.150.148]) by hq.fsi.io (Postfix) with ESMTPSA id 16110820EC9; Sun, 19 Mar 2017 23:55:36 +0000 (UTC)
From: Paul Vixie <vixie@fsi.io>
To: DNSOP <dnsop@ietf.org>
Date: Sun, 19 Mar 2017 23:55:35 +0000
Message-ID: <2232822.T0nP9Ksjf9@linux-hs2j>
Organization: Farsight Security, Inc.
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset="us-ascii"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/gjzGZT1tWdCpeWOBFbV2WBnZCOY>
Subject: [DNSOP] adoption mechanics and disclaimers wrt dns-rpz
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 19 Mar 2017 23:55:42 -0000

on sunday march 12, chinese.apricot@gmail.com wrote as follows:

> I'd be happy to see the document proceed under two conditions:  1) it
> becomes a WG document, subject to IETF change control, and 2) that the
> disclaimer requested back on 20170103 be added to the document. To refresh
> the collective mind, here is the missing text:
> 
> applicability statement.
> 
> This draft is documents a process and method for intercepting DNS queries
> and fabricating responses to redirect the querier into a walled garden or
> enclave that is NOT part of the open Internet. Adoption and acceptance of
> this draft is an acknowledgement that the IETF, the IAB and ISOC reject the
> principles espoused at https://open-stand.org/about-us/principles/, in
> particular article 3.  Collective Empowerment insofar as the evolution of
> the DNS is concerned.

i was not subscribed at the time, so i'm working from the archives. the above 
quoted text is wrongheaded and its proposals unacceptable in several ways.

first, the document has been adopted, but is not subject to ietf change 
control. rather, the authors will attempt to modify the text to suit the 
consensus position of the WG, and at publication time, rights to create 
derivative works will be released to the IETF. so, the WG has domain over the 
meaning of the final document and the content of future documents, but not 
over the content of the final document. the authors want to work with the 
community to ensure that a consensus document is published, but we do not want 
to open the door to wrongheaded and unacceptable wordings typified by the 
above.

second, your disclaimer won't be added, and if the consensus of the WG is that 
it must be added, then the standardization activity of dns-rpz will fail. you 
are free to pitch your ideas, and the authors are free to try to accommodate 
those ideas, but the final arbiter of whether accommodation is necessary or 
has been accomplished is WG consensus, not the authors, and not any WG member.

third, ignoring completely the words and the wording of your proposed 
applicability statement, and focusing purely on the ideas it contains, let's 
dispense with the nonsequiturs and canards as follows:

* queries are not intercepted; they are processed differently and deliberately 
by an RDNS server which has voluntarily subscribed to explicit policy sources.

* response fabrication is in this case a service desired by the end-user and 
by the RDNS operator, thus, "fabrication" has improper connotation.

* redirection is by no means the only capability offered.

* walled gardens or enclaves may, or may not, be part of the open internet.

* adoption and acceptance does not acknowledge anything like what's shown. 
rather, it's an acknowledgement that the internet now does work this way, at 
the deliberate and voluntary behest of its RDNS operators and users, and that 
a specification document has two boons: in the short term, giving implementors 
and publishers a single authoritative reference for how dns-rpz works now; 
and, giving change control of the dns-rpz protocol itself over to the IETF 
upon this document's publication, so that the community can drive changes in 
the protocol henceforth.

i did not note any second or other voice in favour of this amendment, and due 
to the vacuous pseudo-mumbo alt-jumbo of the proposal, i predict there will be 
no other voice in favour of it.

so, the authors propose a replacement for the current abstract:

>     This document describes a method for expressing DNS response policy
>     inside a specially constructed DNS zone, and for recursive name
>     servers to use such policy to return modified results to DNS clients.
>     Such modified DNS results might prevent access to selected HTTP servers,
>     or redirect users to "walled gardens", or block objectionable email, or
>     otherwise defend against DNS content deemed malicious by the RDNS
>     operator or end-user. These so-called "DNS Firewalls" are widely used in
>     fighting Internet crime and abuse.
>     
>     Like other mechanisms called "firewalls," response policy zones (RPZ)
>     can be used to block wanted SMTP, HTTP, and other data as well as
>     unwanted data.  RPZ ought not be used to interfere with data desired by
>     recipients. In other words, RPZ should be deployed only with the
>     permission of any and all affected RDNS end-users.
>     
>     This document does not recommend the use of RPZ in any particular
>     situation or instead of other mechanisms including those more
>     commonly called "firewalls." This document lacks an applicability
>     statement for that reason, and because it merely describes a currently
>     common practice, without recommending or criticising that practice.

please chime in if you're for or against this proposed text, or if for some 
incomprehensible reason you are in favour of chinese.apricot@gmail.com's 
proposal from march 12 and want it to be further considered or debated.

the authors will work toward consensus, but not arbitrarily so.

vixie