Re: [DNSOP] EDNS0 clientID is a wider-internet question

Jacob Hoffman-Andrews <jsha@eff.org> Tue, 25 July 2017 07:51 UTC

Return-Path: <jsha@eff.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B102512F280 for <dnsop@ietfa.amsl.com>; Tue, 25 Jul 2017 00:51:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.003
X-Spam-Level:
X-Spam-Status: No, score=-7.003 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=eff.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e3cK20AnNfjU for <dnsop@ietfa.amsl.com>; Tue, 25 Jul 2017 00:51:06 -0700 (PDT)
Received: from mail2.eff.org (mail2.eff.org [173.239.79.204]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7EBC912EA95 for <dnsop@ietf.org>; Tue, 25 Jul 2017 00:51:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=eff.org; s=mail2; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version:Date:Message-ID:From:References:Cc:To:Subject; bh=4YsxyVEIC9ueWQDQfVLFdCVW32YCyqLH7wT3WD9kAyY=; b=OX/b95QrE5Bw6qTn5os9GrnN4u1AHRF2z+a6gSAxd0vdBg/ilVP1YUdhkFqB1JDwSrvGJxtC0moeWqPn23AjjqbcojHeYV20YqGN6b8I0eqBX/TQCvF1BZXvCbgY7FeMaQGW/dPgi6wc5qzYJIPIY8rMn05przxkBeVRo3a6sgQ=;
Received: ; Tue, 25 Jul 2017 00:51:03 -0700
To: Paul Wouters <paul@nohats.ca>, Christopher Morrow <morrowc.lists@gmail.com>
Cc: dnsop WG <dnsop@ietf.org>, Ted Lemon <mellon@fugue.com>, George Michaelson <ggm@algebras.org>
References: <CAKr6gn1mZ7VTfM_wtpFX-G95wg-bWRA_YciZScFvr-YX8eYdWg@mail.gmail.com> <CAPt1N1nutxneiZg1JR90O5vRXVs+0WHvRtHpwCRyn4bXpf6g4A@mail.gmail.com> <CAL9jLaZrsiGZUPJzT1bZG-K2mTt3wP=x05-_Qp=rRh8uaBjS4g@mail.gmail.com> <5D73941C-B108-4A14-AEE5-7A28BCA94373@nohats.ca>
From: Jacob Hoffman-Andrews <jsha@eff.org>
Message-ID: <8d27cf2a-a883-7186-11bb-eeacd0bce68c@eff.org>
Date: Tue, 25 Jul 2017 00:51:04 -0700
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
In-Reply-To: <5D73941C-B108-4A14-AEE5-7A28BCA94373@nohats.ca>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/ioUOggSW597T9jsTK8ffTD7n4vg>
Subject: Re: [DNSOP] EDNS0 clientID is a wider-internet question
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Jul 2017 07:51:08 -0000

I agree: The EDN0 Client ID draft seems quite bad from a privacy
perspective, and I believe it should not be adopted.

More broadly, enforcing content blocks with DNS is an anti-pattern. If
we're assuming that the entity doing the content blocking has
administrative access to DNS clients, they can simply install content
blockers there. That allows much finer-grained blocked, like blocking
individual pages rather than having to block all of Tumblr because of a
request to block a single page.

The draft even acknowledges the ineffectiveness of DNS-based content
blocking:

>   DNS filtering products are easy circumvented and should not be
>   considered real security measures.  With commonly available tools it
>   is trivial to discover the non-filtered DNS responses and use them in
>   place of the filtered responses.

So it seems incorrect to propagate a privacy-harming DNS extension that
is ineffective at its stated goals.