Christian Huitema wrote on 2019-03-10 21:14:
....
There are a bunch of conflicting requirements here, and it would be good
to tease out the contradictions. Consider the following cases:
1) I am using my phone, and using application-X.
2) I am at home, using application-X on my home computer.
3) I am using Wi-Fi in a hotel, and using application-X.
4) I am using my work laptop on the enterprise network, and using
application-X
5) I am using my work laptop in a hotel, and using application-X
6) I am using my work laptop on the network of a customer, and using
application-X.
this distinction is not useful.
there are two cases.
a user or app trusts its network.
or not.
in the first case, you'll use an RDNS service which is in the set
(allowed (preferred)). that is, you'll use the server you desire most
out of the set that your network operator allows you to reach.
in the second case, you'll use a VPN, for all of your traffic, not just
for DNS, because if you hide your DNS but not the connections which
result from such hiding, it will add no measurable privacy.
Today, plenty of people claim the right to control how I use the DNS: my
phone carrier, my ISP at home, the company that got the contract to
manage the hotel's Wi-Fi, the IT manager for my company's laptop, the IT
manager for the company that I am visiting. Out of those, there is just
one scenario for which the claim has some legitimacy: if the company
pays for my laptop and own the laptop, yes of course it has a legitimate
claim to control how I am using it. Otherwise, I, the user, get to
decide. If I like the application's setting better than the network's
default, then of course I expect those settings to stick.
this distinction is also false.
if you are using my network, then it makes no difference which of us
bought you that laptop. you will use the RDNS i allow you to use. RDNS
is part of the control plane, and i use it for both monitoring and
control. sometimes that's so that i can see malware beacon to its C&C.
sometimes that's so that i can institute parental controls.
if you don't like my rules, you should vote with your feet, and not
visit me. because that is the only choice you will have. (yes, i will be
part of a major new project to identify and block all DoH services, so
that behavioural security policies can still work, because you may have
noticed that the internet has never become MORE secure from new tech,
but it occasionally becomes LESS secure more slowly because of policy.)
quoting again the salient passage of RFC 8484's self-damning introduction:
... Two primary use cases were considered during this protocol's
development. These use cases are preventing on-path devices from
interfering with DNS operations, ...
let me give you advance notice: "i aim to misbehave."[1] that is, _i am
on-path, and i intend to interfere._ why on earth the IETF decided to
equate dissidents (of whom there are tens of thousands, all of which
need full VPN's not just DoH for actual safety) with bots (of which
there are tens of millions), and set up a war between end users and
network operators, i will never understand, or try to. now, we fight.
--
P Vixie
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop