Paul, > (yes, i will be part of a major new project to identify and block all DoH services, so > that behavioural security policies can still work, because you may have > noticed that the internet has never become MORE secure from new tech, > but it occasionally becomes LESS secure more slowly because of policy.)
I would be very interested, if you are so inclined, to hear more of what you are thinking. Is this something you can (are willing to) talk about? It sounds like a very thought-provoking initiative. Thanks, Nalini On Mon, Mar 11, 2019 at 10:55 AM Paul Vixie <p...@redbarn.org> wrote: > > > Christian Huitema wrote on 2019-03-10 21:14: > ... > > There are a bunch of conflicting requirements here, and it would be good > > to tease out the contradictions. Consider the following cases: > > > > 1) I am using my phone, and using application-X. > > > > 2) I am at home, using application-X on my home computer. > > > > 3) I am using Wi-Fi in a hotel, and using application-X. > > > > 4) I am using my work laptop on the enterprise network, and using > > application-X > > > > 5) I am using my work laptop in a hotel, and using application-X > > > > 6) I am using my work laptop on the network of a customer, and using > > application-X. > > this distinction is not useful. > > there are two cases. > > a user or app trusts its network. > > or not. > > in the first case, you'll use an RDNS service which is in the set > (allowed (preferred)). that is, you'll use the server you desire most > out of the set that your network operator allows you to reach. > > in the second case, you'll use a VPN, for all of your traffic, not just > for DNS, because if you hide your DNS but not the connections which > result from such hiding, it will add no measurable privacy. > > > Today, plenty of people claim the right to control how I use the DNS: my > > phone carrier, my ISP at home, the company that got the contract to > > manage the hotel's Wi-Fi, the IT manager for my company's laptop, the IT > > manager for the company that I am visiting. Out of those, there is just > > one scenario for which the claim has some legitimacy: if the company > > pays for my laptop and own the laptop, yes of course it has a legitimate > > claim to control how I am using it. Otherwise, I, the user, get to > > decide. If I like the application's setting better than the network's > > default, then of course I expect those settings to stick. > > this distinction is also false. > > if you are using my network, then it makes no difference which of us > bought you that laptop. you will use the RDNS i allow you to use. RDNS > is part of the control plane, and i use it for both monitoring and > control. sometimes that's so that i can see malware beacon to its C&C. > sometimes that's so that i can institute parental controls. > > if you don't like my rules, you should vote with your feet, and not > visit me. because that is the only choice you will have. (yes, i will be > part of a major new project to identify and block all DoH services, so > that behavioural security policies can still work, because you may have > noticed that the internet has never become MORE secure from new tech, > but it occasionally becomes LESS secure more slowly because of policy.) > > quoting again the salient passage of RFC 8484's self-damning introduction: > > > ... Two primary use cases were considered during this protocol's > > development. These use cases are preventing on-path devices from > > interfering with DNS operations, ... > > let me give you advance notice: "i aim to misbehave."[1] that is, _i am > on-path, and i intend to interfere._ why on earth the IETF decided to > equate dissidents (of whom there are tens of thousands, all of which > need full VPN's not just DoH for actual safety) with bots (of which > there are tens of millions), and set up a war between end users and > network operators, i will never understand, or try to. now, we fight. > > -- > P Vixie > > -- Thanks, Nalini Elkins President Enterprise Data Center Operators www.e-dco.com
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop