On 9/3/15, John R Levine <jo...@taugh.com> wrote:
>> Until the invention of quantum computers, we can protect data from
>> being instantly available to most of these groups most of the time.
>
> Aw, come on.  There are root servers in China.
>

I'm much more worried about the root servers run by people who also
deploy drones for assassination, thanks. Though in the end, I'm
concerned about those servers and all the network links too.

With query minimization and link level encryption, we'll still have to
deal with operators that will behave badly. That is yet another
problem to tackle and important! DNSSEC solves many of the bad
behaving operator issues but not issues of confidentiality. I guess
there are some things we can to show that a root server is misusing
otherwise unpublished information with some kind of honeytoken.

With query privacy, link level encryption, query minimization and so
on, I think there would be a massive step forward in the security of
the DNS. Right now - we don't need to be seriously concerned with
where a root server is in terms of the violation of privacy - almost
all of the networks of the world are monitored by *someone* at the
moment.

>> My outline is as follows: everyone and every system should have
>> security and privacy in the form of forward-secret authenticated
>> cryptography, all of the time, enabled by default.
>
> That's nice, but this is the IETF.  We can't even get people to stop
> running BIND 4.

Not with that attitude, obviously!

The IETF is able to make strong privacy respecting standards that
protect users and operators alike. The anti-privacy obstructionism
attitude from some in the IETF is pretty frustrating. This negative
attitude stalls classification of problems as well as standardization
of positive changes and it causes a lot of needless infighting.

Mass surveillance is a problem and what I said seems a reasonable
goal. I'm open to counter proposals and the same question I asked
Vixie is really for everyone or anyone at all.

Even though we won't achieve it overnight, once we figure out what to
do - it is possible to solve it for anyone willing to deploy those
solutions. We might even get those people running BIND (4!?) to
upgrade!

All the best,
Jacob

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to