On 13 Nov 2013, at 10:43, Stephane Bortzmeyer <bortzme...@nic.fr> wrote:
> Contracts do not solve everything: let's assume the manager of the > ccTLD .cp outsources one name server to a company in the USA. The > contract clearly states that the contractor MUST NOT send collected > DNS traffic data to anyone but the registry. Now, a FBI agent comes to > the contractor and, invoking the Patriot Act, request the data (with, > of course, a gag order preventing the contractor to warn its > client). What would the contractor do? Decline contracts from customers who have those requirements since they can't meet them. Though those customers will/should be taking their business to companies outside USA^W^Win other jurisdictions anyway. And surely the customer will be obliged to enter contracts that comply with their national law anyway? We have this in Europe already wrt Data Protection: personal data can't be exported to a jurisdiction that does not have an equivalent or better Data Protection regime. BTW, you seem to be making an assumption that the DNS query data for some domain is "owned" by the domain name holder. I'm not sure that's the case. However we should leave that layer-9+ discussion to the lawyers and keep it well away from the IETF. >> These may well include "management reports" that could well provide >> access in one way or another to the underlying query data. Some of >> the better DNS hosting providers have already been doing this for >> years. Whether a customer chooses to look at that data or use those >> facilities is another matter of course. > > The real problem is "reasonable user expectation". Imagine a secondary > name server of .cp hosted in China. Most users of the TLD .cp would be > quite surprised to know that their data is potentially captured there. I'm struggling to see why anyone could have that sort of expectation these days. The vast majority won't even be aware DNS is involved in their use of the interwebs at all. [Or what google, facebook, $CloudProvider, et al is harvesting from their activity.] They send a lookup into the public Internet, have no way of knowing which DNS server answers (or where it is located), or who might be listening in to that traffic. Given the recent Snowden revelations, anyone who is vaguely awake must realise they have next to no expectation of privacy or anonymity whenever they use the Internet or PSTN as supplied by their ISP or telco. _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop