Re: [DNSOP] Draft for dynamic discovery of secure resolvers

Paul Vixie <paul@redbarn.org> Mon, 20 August 2018 16:57 UTC

Return-Path: <paul@redbarn.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4D52E130E21 for <dnsop@ietfa.amsl.com>; Mon, 20 Aug 2018 09:57:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N2iwfxSpWg65 for <dnsop@ietfa.amsl.com>; Mon, 20 Aug 2018 09:57:57 -0700 (PDT)
Received: from family.redbarn.org (family.redbarn.org [IPv6:2001:559:8000:cd::5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C870130E3C for <dnsop@ietf.org>; Mon, 20 Aug 2018 09:57:57 -0700 (PDT)
Received: from [IPv6:2001:559:8000:c9:1c6f:2fd8:8c7b:9a62] (unknown [IPv6:2001:559:8000:c9:1c6f:2fd8:8c7b:9a62]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by family.redbarn.org (Postfix) with ESMTPSA id 46797892C6; Mon, 20 Aug 2018 16:57:57 +0000 (UTC)
Message-ID: <5B7AF30F.7040409@redbarn.org>
Date: Mon, 20 Aug 2018 09:57:51 -0700
From: Paul Vixie <paul@redbarn.org>
User-Agent: Postbox 5.0.25 (Windows/20180328)
MIME-Version: 1.0
To: Ted Lemon <mellon@fugue.com>
CC: Joe Abley <jabley@hopcount.ca>, dnsop WG <dnsop@ietf.org>
References: <CAC=TB13mUH2SDxFb4c3rOz0-Z6PE_r9i84_xK=dmLxiVr45+tA@mail.gmail.com> <CAPt1N1=-792WkQmbTigPdqOh0dONykYycG0hheOecoQa4ai=Hw@mail.gmail.com> <CAC=TB11tG4o0dkavXGb20=DGBCrmVoRP60bpzsvq5=Q0zFjhDg@mail.gmail.com> <CAPt1N1kj7Y0dPLeDk=PMqQEpAd-Mvds6VLT8XUC1BYOfdyUbJA@mail.gmail.com> <CAC=TB125M81nwiCTNr8Vbee+Z7Fh_3L+6EdZ8evXVzP-2ji4fg@mail.gmail.com> <CAPt1N1n9hDUZQ-Ltvs73T20=fpG-FR_j-t4m0kMapDiv2Us1kw@mail.gmail.com> <5B78BFB9.40103@redbarn.org> <47508D79-0D49-4F31-9BA6-6DC80C38F1DE@cable.comcast.com> <ad1f6dff-ebcc-97a9-6f4b-1ed683827cc7@dougbarton.us> <1313743534.13562.1534765718802@appsuite.open-xchange.com> <9AFE57A7-1D27-4F86-9013-E3C63E63C582@hopcount.ca> <5B7AE322.3020201@redbarn.org> <CAPt1N1m-Xd-7rvgmk8GOsx34=1hsu76nmTgW-8krC3JF7i57KQ@mail.gmail.com> <265867956.15518.1534783313366@appsuite.open-xchange.com>
In-Reply-To: <265867956.15518.1534783313366@appsuite.open-xchange.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/wt8_tzuuv-3t-72CuV-Wt0pq8BY>
Subject: Re: [DNSOP] Draft for dynamic discovery of secure resolvers
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Aug 2018 16:58:00 -0000

>> Il 20 agosto 2018 alle 17.55 Ted Lemon<mellon@fugue.com>  ha
>> scritto:
>>
>> I am entirely within my rights to use DoH whether the network
>> operator likes it or not.

so, their network, but not their rules? when spammers used to tell me 
that sending spam wasn't illegal and i had to accept it, i blackholed 
them and said, my network, my rules. who has what rights, and why?

>> It is certainly true that in some cases, someone using DoH would be
>> violating a network operator policy that is enforceable, or would
>> be violating the law.   But that is by no means the most common
>> case, and it does you no credit to pretend otherwise.

some references i've seen go by in this thread indicate that the DoH 
team wants its protocol to be unblockable, and hopes that RDNS DOH 
providers will co-locate their DOH endpoints with other valuable 
content, "so that network operators will think twice about blocking it."

if there are use cases beyond violating the law and violating network 
operator security policy, then they are obviously secondary, but do 
tell-- what do you think those might be?

i also block tor endpoints. because, my network, my rules. if it's going 
to be my network but mozilla's or cloudflare's rules, then this 
conversation is going to travel very differently, because i'll still be 
paying for it, but it won't be _my_ network any more. would that sit 
well with you? it wouldn't with me.

-- 
P Vixie