On Wed, Nov 13, 2013 at 10:32:27AM +0000, Jim Reid <j...@rfc1035.com> wrote a message of 16 lines which said:
> Whenever someone outsources (part of) their DNS service, this > usually involves a contract Contracts do not solve everything: let's assume the manager of the ccTLD .cp outsources one name server to a company in the USA. The contract clearly states that the contractor MUST NOT send collected DNS traffic data to anyone but the registry. Now, a FBI agent comes to the contractor and, invoking the Patriot Act, request the data (with, of course, a gag order preventing the contractor to warn its client). What would the contractor do? > These may well include "management reports" that could well provide > access in one way or another to the underlying query data. Some of > the better DNS hosting providers have already been doing this for > years. Whether a customer chooses to look at that data or use those > facilities is another matter of course. The real problem is "reasonable user expectation". Imagine a secondary name server of .cp hosted in China. Most users of the TLD .cp would be quite surprised to know that their data is potentially captured there. > BTW Stephane is well ahead of the rest of us when it comes to the > issues of privacy and data protection -- and their second-order > effects -- relating to DNS query streams, particularly in a European > context. This work started inside CENTR <https://centr.org/> so I think we could all thank the CENTR members. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop