On 9/1/15, John R Levine <jo...@taugh.com> wrote:
>>> Please do not put words in my mouth.  They're important but they're not
>>> a
>>> DNS problem.
>>
>> I think reasonable people might disagree?
>
> Not really.  It's a layering issue.

It is a design flaw from an era when fax machines roamed the earth.

>> In my view and the DNS has a critical flaw: it does not provide query
>> privacy.
>
> It can't be a critical flaw -- if it were we'd consider the DNS to be
> broken and we wouldn't be using it.  It's certainly true that people
> are using the DNS in environments that nobody imagined in the 1980s,
> and some of those environments have desiderata like query privacy
> that DNS classic doesn't.

It is a critical flaw that fails open. The DNS continues to work but
users are put into harm's way. The lack of query privacy is a problem
that enables selector based surveillance unlike almost any other
protocol. I rarely, if ever, use DNS on networks directly as a client
as a result of these issues.

>
> Also please keep in mind that we're having this discussion because of
> design tradeoffs in the implementation of Tor.  If they'd made onion a
> URI scheme rather than a pseudo-domain, onion://blah rather than
> http://blah.onion, there's be no leakage problem since browsers that
> don't know about onion: would just reject them.  Using a pseudo-domain
> made it possible to put the Tor implementation into a SOCKS proxy
> which made the implementation a lot easier, but created the leakage
> problem.

I'm aware of the context, I'm a co-author of the RFC in question. The
solution you present is not practical for integration across most
programs without huge modifications to nearly every program.

Or put another way:

  "The internet is more than the world wide web"

>
> While I have a great deal of sympathy for the goals of the Tor
> project, I do not think it is solely up to us to protect them and
> their users from the consequences of their design tradeoffs.

The issue isn't just Tor. Our users are already protected - this is to
stop *other* users from shooting themselves in the foot. As it stands,
many users are under the false assumption that they the internet
actually has privacy properties without Tor.

All the best,
Jacob

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to