On Wed, 19 Apr 2023 at 20:49, Benjamin Schwartz <i...@bemasc.net> wrote:
> > > On Wed, Apr 19, 2023 at 10:04 AM tirumal reddy <kond...@gmail.com> wrote: > >> On Tue, 18 Apr 2023 at 16:41, Benjamin Schwartz <i...@bemasc.net> wrote: >> >>> The draft's opening words are "DNS filtering is widely deployed for >>> network security". This is true, but by far the "widest" deployment of DNS >>> filtering is for authoritarian national censorship, to prevent citizens >>> from engaging with forbidden ideas. >>> >>> The EDE draft acknowledges and rebukes this rather directly with the >>> "Censored" code, expressing that this filtering was performed _against_ the >>> preference of the resolver operator. Although the EDE registry is FCFS, >>> the presence of this registry entry at the outset ensures that any attempt >>> to whitewash this sort of behavior would be duplicative. >>> >>> The "structured errors" draft risks undermining this norm and diluting >>> the intent of the "Censored" code. For example, the "Malware", "Phishing", >>> "Spam", and "Spyware" suberrors are listed as applicable to the "Censored" >>> code, which is rather strange. What is a "Spam" domain, and when would a >>> resolver be forced to filter it "due to an external requirement imposed by >>> an entity other than the operator"? >>> >> >> Yes, "Spam" is not suitable with "Censored" code. The other suberror >> codes may be applicable with "Censored" code. For instance, in a deployment >> where the network-provided DNS forwarder is configured to use a public >> resolver to filter malware domains. >> > > "Censored" requires that the blocking is "due to an external requirement > imposed by an entity other than the operator of the server resolving or > forwarding the query". This does not correspond to the situation you are > describing, where the filtering is "inherited" but not "required" or > "imposed". > > I don't know of any situation today in the world where "Censored" could > logically be used with any of these sub-errors. We would have to imagine a > situation where the resolver operator is being _forced_ to apply malware > filtering, not choosing to do so. > I see your point, will remove use of "Censored" from the draft. We probably need a new error code (Blocked by upstream server) to address the above scenario. The server (e.g, DNS forwarder) is unable to respond to the request because the domain is on a blocklist due to an internal security policy imposed by the upstream server (e.g., DNS resolver). > Personally, I don't think these "sub-errors" make a lot of sense for > "Censored". We should consider excluding "Censored" from this draft, or > focusing instead on providing objective information about the block. We > can take inspiration from some of the work related to HTTP 451: > - RFC 7725 defines the "blocked-by" relation, to identify the party that > implemented the censorship. This is relevant to DNS when forwarders are in > use. > - draft-sahib-451-new-protocol-elements-01 (expired) proposed > "blocking-authority" and "geo-scope-block" headers to identify the source > and scope of the block. > > Regardless of the draft's details, I think work related to DNS filtering > should generally receive HRPC review prior to WGLC. > Sounds good to me. -Tiru > > --Ben Schwartz >
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop