Hi Patrick,

Consider me a somewhat informed EU-based internet user.

I support Mozilla pushing forward with DNS integrity and privacy. I hope the 
study can shed more insight into how widespread the problems are, without 
causing overreactions, panic and loss of perspectives. I have no objection to 
the details of how the study is being performed. It seems to me that users who 
have opted to run Nightlies has in part already given consent to be guinea pigs 
- though I don't know how far this covers their data integrity and privacy.

I'm more concerned about agreeing on a good goal state of future possible 
integration of this feature into the browser (and possibly setting standard for 
other browsers).

1. Consent - specifically in the EU, full compliance with EU GDPR requires 
users' being able to opt-in on extra data processing and sharing with 3rd 
parties. (I.e. if X is some bonus feature, by default X must be opted in to by 
users. Services must be possible to use with a minimal set of privacy exposure 
in terms of what data processing organisations are involved. IMO these are 
truly good standards, and I don't buy the "users are stupid" argument - "that's 
a UX issue" (have seen lots of good GDPR consent UI improvements recently))

2. Going forward, I assume the intent of Mozilla is to use future DoH server 
selection methods including automatic ones, for example OS-managed ones where a 
DHCP option or equivalent has provided the DoH servers from the users' ISPs?

3. Would Mozilla consider moving forward with the feature prior to automated 
OS-managed server selection methods, i.e. relying on what I assume has to be 
manual application-based configuration? 

4. How would said application-based configuration promote diversity of 
providers and counter-act the centralization of user data and DNS history?

5. Specifically, a future scenario with a default on & opt-out where a specific 
single provider such as CF is responsible for all Mozilla browser DoH DNS, 
would actually be a very bad one from a privacy perspective, generally due to 
the overly centralization of user data, and specifically due to CF being a US 
based company which adheres to US laws which provides essentially zero 
protection of non-US citizens privacy in terms of mass surveillance (EU Court 
of Justice). This scenario simply doesn't fly. Opt-in based on informed consent 
would be absolutely necessary, I believe.

There be dragons and there are several variables to consider in total user 
privacy.

This said, I'm definitely looking forward to interesting results from this 
study and future improved total user privacy. 

Best regards,
Martin Millnert

On Saturday, March 17, 2018 at 11:51:02 AM UTC+1, Patrick McManus wrote:
> Hi All, FYI:
> 
> Soon we'll be launching a nightly based pref-flip shield study to confirm
> the feasibility of doing DNS over HTTPs (DoH). If all goes well the study
> will launch Monday (and if not, probably the following Monday). It will run
> <= 1 week. If you're running nightly and you want to see if you're in the
> study check about:studies
> 
> Access to global DNS data is commonly manipulated and can easily be blocked
> and/or collected. DNS services are also sometimes poorly provisioned
> creating performance problems. We posit that integrity and confidentiality
> protected access to well provisioned larger caches will help our users. In
> a nutshell, that's what DoH does.
> 
> This work relies on a IETF specification that I hope will go into Last Call
> this coming week: https://datatracker.ietf.org/doc/draft-ietf-doh-
> dns-over-https/
> 
> This initial test is focused on performance feasibility assessment and we
> won't actually be using the DNS data returned from the DoH server (i.e. the
> traditional DNS service is used in parallel and only those answers are used
> - the code calls this shadow mode.) This is obviously not the optimal
> arrangement of things - the anticipated end state will involve running in
> "first mode" where DoH is normally used and soft fails (either based on DNS
> or TCP errors) to traditional DNS. There are also modes where DoH is used
> and hard fails (known as "only mode" - it requires some bootstrap info),
> and a mode where DoH and traditional race against each other using
> whichever is faster. Their are acomodations in place to deal with
> split-horizon DNS issues.
> 
> DoH is an open standard and for this test we'll be using the DoH server
> implementation at Cloudflare. As is typical for Mozilla, when we
> default-interact with a third party service we have a legal agreement in
> place to look out for the data retention/use/redistribution/etc interests
> of both our users and Mozilla itself.
> 
> The study launch bug is https://bugzilla.mozilla.org/show_bug.cgi?id=1446404
> 
> Daniel Stenberg has written much of the code for this - he, I, and Valentin
> Gosu are the team that will chase down any issues. Feel free to reach out
> to us (or #necko on slack). There is currently one open issue related to
> captive portals and "only mode" but that should not be triggered by the
> study as "only mode" is not used.
> 
> -Patrick

_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to