Please see inline [TR] From: dns-privacy <dns-privacy-boun...@ietf.org> On Behalf Of nalini elkins Sent: Monday, March 11, 2019 11:05 AM To: Paul Vixie <p...@redbarn.org> Cc: Stephen Farrell <stephen.farr...@cs.tcd.ie>; d...@ietf.org; dnsop@ietf.org; Christian Huitema <huit...@huitema.net>; dns-priv...@ietf.org; Vittorio Bertola <vittorio.bertola=40open-xchange....@dmarc.ietf.org>; Ackermann, Michael <mackerm...@bcbsm.com> Subject: Re: [dns-privacy] [DNSOP] New: draft-bertola-bcp-doh-clients
CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe. ________________________________ Paul, > (yes, i will be part of a major new project to identify and block all DoH > services, so > that behavioural security policies can still work, because you may have > noticed that the internet has never become MORE secure from new tech, > but it occasionally becomes LESS secure more slowly because of policy.) I would be very interested, if you are so inclined, to hear more of what you are thinking. Is this something you can (are willing to) talk about? [TR] Enterprise networks are already able to block DoH services, it is causing the DoH client to fallback to clear-text DNS compromising endpoint security and privacy. In draft https://tools.ietf.org/html/draft-reddy-dprive-bootstrap-dns-server-01 we are proposing mechanisms to automatically bootstrap endpoints to discover and authenticate privacy-enabling DNS servers provided by the Enterprise network. The user also gets to know the privacy preserving data policy by the DNS server and can decide whether to switch to another network or if the user trusts the network and privacy policy, the user can enable strict privacy profile with the privacy enabling DNS server discovered in the Enterprise network itself instead of downgrading to opportunistic privacy profile. Cheers, -Tiru It sounds like a very thought-provoking initiative. Thanks, Nalini On Mon, Mar 11, 2019 at 10:55 AM Paul Vixie <p...@redbarn.org<mailto:p...@redbarn.org>> wrote: Christian Huitema wrote on 2019-03-10 21:14: .... > There are a bunch of conflicting requirements here, and it would be good > to tease out the contradictions. Consider the following cases: > > 1) I am using my phone, and using application-X. > > 2) I am at home, using application-X on my home computer. > > 3) I am using Wi-Fi in a hotel, and using application-X. > > 4) I am using my work laptop on the enterprise network, and using > application-X > > 5) I am using my work laptop in a hotel, and using application-X > > 6) I am using my work laptop on the network of a customer, and using > application-X. this distinction is not useful. there are two cases. a user or app trusts its network. or not. in the first case, you'll use an RDNS service which is in the set (allowed (preferred)). that is, you'll use the server you desire most out of the set that your network operator allows you to reach. in the second case, you'll use a VPN, for all of your traffic, not just for DNS, because if you hide your DNS but not the connections which result from such hiding, it will add no measurable privacy. > Today, plenty of people claim the right to control how I use the DNS: my > phone carrier, my ISP at home, the company that got the contract to > manage the hotel's Wi-Fi, the IT manager for my company's laptop, the IT > manager for the company that I am visiting. Out of those, there is just > one scenario for which the claim has some legitimacy: if the company > pays for my laptop and own the laptop, yes of course it has a legitimate > claim to control how I am using it. Otherwise, I, the user, get to > decide. If I like the application's setting better than the network's > default, then of course I expect those settings to stick. this distinction is also false. if you are using my network, then it makes no difference which of us bought you that laptop. you will use the RDNS i allow you to use. RDNS is part of the control plane, and i use it for both monitoring and control. sometimes that's so that i can see malware beacon to its C&C. sometimes that's so that i can institute parental controls. if you don't like my rules, you should vote with your feet, and not visit me. because that is the only choice you will have. (yes, i will be part of a major new project to identify and block all DoH services, so that behavioural security policies can still work, because you may have noticed that the internet has never become MORE secure from new tech, but it occasionally becomes LESS secure more slowly because of policy.) quoting again the salient passage of RFC 8484's self-damning introduction: > ... Two primary use cases were considered during this protocol's > development. These use cases are preventing on-path devices from > interfering with DNS operations, ... let me give you advance notice: "i aim to misbehave."[1] that is, _i am on-path, and i intend to interfere._ why on earth the IETF decided to equate dissidents (of whom there are tens of thousands, all of which need full VPN's not just DoH for actual safety) with bots (of which there are tens of millions), and set up a war between end users and network operators, i will never understand, or try to. now, we fight. -- P Vixie -- Thanks, Nalini Elkins President Enterprise Data Center Operators www.e-dco.com<http://www.e-dco.com>
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop