Reposting to the list what I shared with Richard Bennett earlier. The Google Public DNS privacy policy is at https://developers.google.com/speed/public-dns/privacy. Maybe I should have included a link to it in the earlier email. If you have comments on it, please share.
We are following https://tools.ietf.org/html/draft-ietf-dprive-bcp-op and have commented on an earlier version. -Puneet On Sat, Mar 23, 2019 at 3:48 AM Richard Bennett <rich...@bennett.com> wrote: > > I like it if you would kindly define “privacy” in the context of “a DNS > resolver that protects our users’ privacy.” Does that mean hiding their > lookups from ISPs who might want to enter the market for targeted ads while > using them for your company’s own purposes, or just protecting user queries > made over insecure public Wi-Fi networks from easy snooping? Because there > are better ways to do the latter than with a system that opts users into a > centralized resolver. > > RB > > On Mar 22, 2019, at 4:08 PM, Puneet Sood > <puneets=40google....@dmarc.ietf.org> wrote: > > Hello, > > There has been much discussion in the IETF lists over the impact of > using DNS-over-HTTPS (DoH) in a network. We would like to clarify the > Google Public DNS position on this topic. The post I am replying to is > particularly relevant since it makes some assumptions about the plans > of the Google Public DNS service. > > For future support of a RFC 8484 compliant service, we plan to do the > following: > * Serve RFC 8484 compliant DoH from the well known Google Public DNS > anycast IP addresses (e.g. 8.8.8.8) on the standard HTTPS port 443. > * Migrate our existing DoH services to the well known Google Public > DNS anycast IP addresses, including the beta version (at > https://dns.google.com/resolve) and IETF draft version (at > https://dns.google.com/experimental). > > The Google Public DNS anycast IP addresses are distinct from the IP > addresses used to host web content for Google properties. This will > allow operators to control access to the Google Public DNS DoH service > on their networks without impeding access to other Google services. > > For DoH implementers we want to ensure the same access to our > implementation whether it is a Google product (like the Chrome > browser) or a third-party product. To this end we aim to track IETF > work on standardized ways to detect DoH support by the system-selected > DNS resolver service (like > https://tools.ietf.org/html/draft-ietf-doh-resolver-associated-doh-02 > or https://tools.ietf.org/html/draft-reddy-dprive-bootstrap-dns-server-01). > > As a core principle, Google Public DNS aims to provide a DNS resolver > that respects our users’ privacy. Towards that goal, we aim to provide > high quality implementations of various DNS transport mechanisms that > our users can use to reach the service. This includes the traditional > UDP and TCP transports as well as DNS-over-TLS and DNS-over-HTTPS that > provide privacy for the user’s communication with a DNS resolver. > > -Puneet Sood > TL/Manager for the Google Public DNS team. > > PS: I am attending IETF 104 and will be available for face-to-face discussion. > > On Wed, Mar 20, 2019 at 2:40 PM 神明達哉 <jin...@wide.ad.jp> wrote: > > > At Wed, 20 Mar 2019 12:38:05 +0100, > Joe Abley <jab...@hopcount.ca> wrote: > > Often as an industry we may discuss various solutions that are great for > oneself but don’t scale when looking at the big picture. > > > I think what we are seeing is the fundamental tension between privacy and > control. You need to give up some privacy in order to make the control > possible; you need to give up some control in order to afford privacy. > > > Some in this thread want certainty that they are able to exercise control, > e.g. for devices in their network. > > > Some in this thread want certainty that they can obtain privacy, e.g. for for > their device in any network. > > > [...] > > Thank you for the nice, concise summary. I think it's well-balanced > observation of where we are. (I'm so glad I can finally see a > constructive post after seeing a common pattern of boring IETF > discussion, where people with different opinions just keep stating > their views without making any real progress:). > > Seems to me that there's a middle ground within sight here. > > Standardise this privacy mechanism, and specify (with reasoning) that it > should be implemented such that the existence of the channel (but not the > content) can be identified as distinct from other traffic by third parties. > Maybe specify use of a different port number, as was done with DoT. > > > I see that those who want to exercise control can live with this (or > at least using a different set of IP addresses for DoH servers than > those for other ordinary web services). But I'm not so sure if that's > acceptable for the other group.. In that sense I'm curious whether > some big possible DoH providers are now willing to accept this middle > ground. If my memory is correct the longer term plan at Google (and > maybe also Clouldflare?) is to provide DoH service on the same IP > addresses as those for other ordinary and popular web services (and on > port 443, of course), so that an intermediate operator cannot easily > block access to their DoH services. > > Those who choose to ignore that direction and create a covert channel using > port 443 instead will do so. Nothing much we can do to stop that today (I > guarantee it is already happening). The future is not really different. > > > True. But I think giant providers tend to respect a community > consensus. Niche or really malicious players may/will still ignore > it, but it would be very difficult for them to collocate their DoH > services with other important web services that can hardly be blocked, > so it shouldn't be a big problem for "those who want certainty of > control". So if we can really agree on the above "middle ground" and > publish a BCP or something that describes the consensus, I guess we > can now really work on technical issues. But I'm not sure if we can > reach that consensus. > > -- > JINMEI, Tatuya > _______________________________________________ > Doh mailing list > d...@ietf.org > https://www.ietf.org/mailman/listinfo/doh > > > _______________________________________________ > Doh mailing list > d...@ietf.org > https://www.ietf.org/mailman/listinfo/doh > > > — > Richard Bennett > High Tech Forum Founder > Ethernet & Wi-Fi standards co-creator > > Internet Policy Consultant > _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop