Hello,

When I first read draft-livingood-dns-redirect-00, my first thought was about how would it be received if the author was from some country in the Far East. In September 2008, the IETF published BCP 140 about preventing use of recursive nameservers in reflector attacks. The discussion was mainly about recursive nameservers being evil. There may be good reasons for so-called DNS Redirect services. It has been argued that the closed model of the "walled garden" simplifies security. Quoting RFC 3002:

  "carriers typically prefer to have complete (or as much as
   possible) control over the entire service, including user access
   device, transmission facilities, and service 'content'.  This style
   of service model appears to have been inherited from the classic
   telephony provider model.  The term "walled garden" was coined to
   describe the resulting captive customer economic and service model.
   That is, the user is constrained within the limits of the service
   provided by the carrier with limited ability to extend features or
   access services outside the provider. The 'walled garden' service
   model is in stark contrast to the 'open' service assumed in
   the Internet."

RFC 3833 discusses about the betrayal by trusted (DNS) server. Quoting some parts of it:

   "The (DNS) server itself may be configured to give back answers that are
    not what the user would expect, whether in an honest attempt to help the
    user or to promote some other goal such as furthering a business
    partnership between the ISP and some third party."

   "Viewed strictly from the DNS protocol standpoint, the only difference
    between this sort of betrayal and a packet interception attack is
    that in this case the client has voluntarily sent its request to the
    attacker."

In Section 2:

  "ISPs and DNS ASPs have discovered over time that their users would
   benefit via 'enhanced' DNS services, which often rely upon
   DNS Redirect functionality".

I suggest using "application service provider (ASPs)" in the Introduction section and using "so-called DNS Redirect functionality". It's debatable whether the DNS service offered is enhanced.

  "These enhanced services, which are
   offered on an opt-in or opt-out basis (with the exception of where
   legal mandates preclude this), can perform a number of value added
   services for users, such as attempting to interpret web address
   errors and protecting users from reaching domains or fully qualified
   domain names (FQDNs, Section 5.1 of [RFC1035]) that would cause a
   user to inadvertently access malware."

Quoting RFC 4367:

  "People often make assumptions about the type of service that is or
   should be provided by a host associated with that name, based on
   their expectations and understanding of what the name implies."

So-called DNS redirects are used for good reasons and also for questionable purposes. If the authors are going to quote reasons, it would be better to have a balanced view instead of mentioning malware only. There has been a "safe browsing" incident that highlights the problem when the user relies on these "enhanced" services.

I suggest an addition to the sentence:

   These enhanced services, which are offered on an opt-in or opt-out basis
   (with the exception of where  legal mandates preclude this), can perform
   a number of value added services for users, such as attempting to interpret
web address errors and protecting users from reaching domains or fully qualified
   domain names (FQDNs, Section 5.1 of [RFC1035]) that would cause a user to
   inadvertently access malware, or as a way to further a business
   partnership between the ISP and some third party.

In Section 4.1:

  "An Internet Service Provider, which provides Internet services,
   including basic network connectivity."

Could one of the authors of the document clarify off-list whether the connectivity provided by an ISP using DNS redirect services is labelled as Full Internet connectivity?

Section 4.6 defines a "Web Error Landing Server" as the host that a user is directed to when the DNS Recursive Server receives a NXDOMAIN response. The Internet user will not be aware of the redirection unless we assume that the user is a Web user.

Section 5.1.3 accentuates the belief that any host with an A and AAAA resource record is a web server.

Section 5.3 discusses about regulatory organizations mandating or otherwise compelling ISPs to perform DNS Redirection. I gather that all IETF participants know about the effectiveness of such measures. :-)

Section 5.3.3 mentions that ISPs should disclose openly that they have been compelled to perform legally-mandated DNS Redirect. Why isn't there a disclosure for any DNS redirect instead of having it restricted to legally mandated DNS redirects only?

Section 8.3 is about Web Browser Clients. There seems to be an assumption that web access is done through Web browsers. Some Web clients run as automated processes and they may be negatively affected by those DNS redirects.

In Section 8.4, it is mentioned that "the owner of example.com may request that the ISP or DNS ASP not perform DNS Redirect for the example.com domain". It will be a lot of work to contact all the ISPs, if that is even possible, to submit such a request.

Domain registrants will probably want to enable DNS wildcards to get around DNS redirects. if the practice of DNS redirects by ISPs is widespread. TLDs without DNS wildcards might resort to it too. The authors of this document may wish to consider the long term effects.

Regards,
-sm

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to