Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Mark Andrews

In message <20090716110830.ga7...@shinkuro.com>, Andrew Sullivan writes:
> Well, I'd discuss it, anyway.  I know that if someone came with a
> document outlining the best way to do split-brain DNS -- which is
> widely deployed and an alternative namespace if ever I've seen one --
> and especially how _not_ to do it, I would take it to be a serious
> contribution.  Similarly, I am listed as one of the authors of the
> DNS64 draft, which is (let's face it) a way to configure an
> interative-mode resolver so that it consistently replaces one kind of
> answer with another kind (or "lies", if you like).  Yet nobody seems
> to have thought so far that _that_ is an especially bad idea.

The big difference is that you still ultimately go to the machine
that you are looking up.  You are not changing the namespace by
adding or removing names.  Additionally the amount rewriting of
 queries will reduce over time as the world moves to IPv6.
There is very little collateral damage being done by DNS64.

There is a lot of collateral damage when you map NXDOMAIN/NXRRSET
to a search page.

Mark
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: ma...@isc.org
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] DNS redirection for fun and profit

2009-07-16 Thread David Conrad

Jim,

On Jul 16, 2009, at 1:30 PM, Jim Reid wrote:

On 16 Jul 2009, at 20:58, David Conrad wrote:
Except for most users, accepting none means "the Internet is  
broken" which will result in ISP or OS vendor support calls which  
will undoubtedly result in users being instructed to turn off  
validation (like they get told to turn off IPv6 today).
OTOH, one might hope that if customer support got flooded with such  
calls the message that Tampering With DNS Responses Is A Very Bad  
Thing would eventually get through to those responsible for that  
behaviour and they'd take action to stop doing that. I can dream,  
can't I?


Sure, but I was talking about was doing DNSSEC in a local resolver in  
the general case, not DNS redirection.


BTW, almost all of the scenarios in Section 5 of draft-livingood-dns- 
redirect-00 are concerned with browser activity and HTTP  
redirection. So it seems to be wrong to (ab)use the DNS to solve  
what looks like a web problem. That appears to be a layering  
violation.


Sure.  I would agree with those who argue that DNS redirection is the  
wrong answer, pretty much regardless of what the question is. However,  
I'd prefer to have _one_ wrong answer instead of a myriad slightly  
different wrong answers.  If you have a single wrong answer, you have  
a much better chance of being able to programmatically get around it.


Regards,
-drc

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


[DNSOP] DNS redirection for fun and profit

2009-07-16 Thread Jim Reid

On 16 Jul 2009, at 20:58, David Conrad wrote:

Except for most users, accepting none means "the Internet is broken"  
which will result in ISP or OS vendor support calls which will  
undoubtedly result in users being instructed to turn off validation  
(like they get told to turn off IPv6 today).


OTOH, one might hope that if customer support got flooded with such  
calls the message that Tampering With DNS Responses Is A Very Bad  
Thing would eventually get through to those responsible for that  
behaviour and they'd take action to stop doing that. I can dream,  
can't I?


BTW, almost all of the scenarios in Section 5 of draft-livingood-dns- 
redirect-00 are concerned with browser activity and HTTP redirection.  
So it seems to be wrong to (ab)use the DNS to solve what looks like a  
web problem. That appears to be a layering violation. I'm not sure  
it's wise to document DNS redirection as a BCP. [DNS redirection may  
well be a current practice, but is it a best practice?] I think this  
draft's next iteration should say a *lot* more about the dangers of  
fiddling with DNS data, particularly in the context of the impact on  
Internet applications that are not web browsers.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread David Conrad

On Jul 16, 2009, at 10:27 AM, Paul Wouters wrote:
DNSSEC doesn't touch anything after the validator.  It will have no  
effect on the vast majority of Comcast (or other consumer oriented)  
ISPs' customers.

Fedora 12 is slated to run with a validator on every machine.


This is the right direction to go.


I would
not be surprised if OSX and Microsoft go in the same direction.


I would be.  Quite.


And the
reason for that move is precisely because the enduser cannot  
distinguish

malicious DNS modifications and beneign DNS modifications. So it is
better to accept none.


Except for most users, accepting none means "the Internet is broken"  
which will result in ISP or OS vendor support calls which will  
undoubtedly result in users being instructed to turn off validation  
(like they get told to turn off IPv6 today).



We are looking at how to resolve the DNS portal issues and non-dnsssec
aware resolvers in the forwarder chain. There are some ideas that need
more attention and thoughts.


Yep.  It is annoying to have to stop using my local (validating)  
resolver any time I use T-Mobile hotspot service.  I've given up using  
T-Mobile hotspot (where possible) for precisely that reason.


Regards,
-drc

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread David Conrad

On Jul 16, 2009, at 11:43 AM, Jeroen Massar wrote:

Please.  Enough hyperbole.
Unless you state that "The Internet" is only "The Web", there are  
other

users of "The Internet" though. Don't try and limit what other people
can do with this public resource.


Could we ratchet down the rhetoric?

DNS redirection does not break the Internet.  DNS redirection can  
result in unanticipated responses.  Some applications can behave in  
sub-optimal ways in the face of these unanticipated responses.  This  
is a far cry from breaking "the Internet".


As far as I can tell, Comcast's network and their recursive servers  
are not a "public resource".  As folks on Comcast's network are not  
forced to be Comcast's customer nor (as far as I know) are they  
required to use Comcast's name servers, I don't see where you, this  
working group, or the IETF has a right to determine what Comcast does.


The point Andrew tried to make is that the lesson we (should have)  
learned with NAT is that folks are going to deploy technologies that  
some may consider ill-advised or impure or "evil" or whatever if they  
find it to be in their interests to do so, regardless of what this  
working group or the IETF may say.  In order to limit the  
proliferation of 'solutions', it is in the best interests of operators  
to standardize on an agreed upon approach and document the  
implications of that approach (both positive and negative) to ensure  
everyone understands what they're doing.  Blocking these efforts  
resulting in various broken ways of doing the same thing are far more  
detrimental to the Internet than the existence of the standardized  
solution.



DNSSEC doesn't touch anything after the validator.  It will have no
effect on the vast majority of Comcast (or other consumer oriented)
ISPs' customers.


"The vast majority" aha, so discrimination of the people who do want  
to

actually have real truthful Internet is acceptable


Might I suggest switching to decaffeinated?

My statement is merely the truth.  The vast majority of consumer  
oriented ISPs supply the DNS resolver settings to their customers.  As  
such, validation would occur prior to the insertion of redirected  
responses.  The exceptionally few applications that try to do  
validation on their own are so far in the noise as to be irrelevant.


As a user of the Internet I *am* running a validating DNSSEC  
recursor on

my hosts. Thanks to ISC for the DLV :)

I am fairly sure that a lot of other people will also want to do this.


A little perspective please.  I'm fairly sure that you and everyone  
else who runs a validating DNSSEC recursor on their host are an  
infinitesimal minority of Internet users.


More to the point, DNS redirection does not imply running your own  
recursor is disallowed.  Yes, it can be implemented in such a way as  
break running your own recursor, but if this occurs, the right answer  
is to vote with your feet.


Regards,
-drc

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Tony Finch
On Thu, 16 Jul 2009, Florian Weimer wrote:
> * Tony Finch:
> > On Thu, 16 Jul 2009, Florian Weimer wrote:
> >>
> >> If you want to address the issue with hotspot doorway pages, you need
> >> protocol changes.
> >
> > Better to use an intercepting proxy in that case, and for quarantining
> > infected hosts.
>
> Doesn't work if the user uses the employer's filtering proxy for web
> access.

I don't see why not, but even so, if they're already using a filtering
proxy they are already safe, and the proxy is responsible for handling
DNS lookup failures.

Which reminds me, another way to solve this problem is using a proxy
auto-config file.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Jeroen Massar
David Conrad wrote:
> On Jul 16, 2009, at 5:43 AM, Jeroen Massar wrote:
>> Livingood, Jason wrote:
>>> Please do send me that list of applications.  I would very much like to
>>> describe these use cases in the next version of the draft.
>>
>> Please list "The Internet" as one of them, it kinda encompasses a lot of
>> others too.
> 
> Please.  Enough hyperbole.

Unless you state that "The Internet" is only "The Web", there are other
users of "The Internet" though. Don't try and limit what other people
can do with this public resource.

I suggest that "Internet Providers" that are going to do these kind of
"filtering techniques" rename themselves to "Limited Web Providers".
That is much more appropriate it seems.

Or we'll just have to change IETF into OIETF for the Open Internet ETF.

>> I am *VERY* happy that DNSSEC is moving along perfectly fine
>> which will kill any kind of changing DNS results.
> 
> DNSSEC doesn't touch anything after the validator.  It will have no
> effect on the vast majority of Comcast (or other consumer oriented)
> ISPs' customers.

"The vast majority" aha, so discrimination of the people who do want to
actually have real truthful Internet is acceptable

I know that certain countries claim to be all about 'freedom' and
'democracy' and I don't know what, but clearly those countries and the
network operators in those countries want to restrict people more than
the countries which simply state that they are doing that on purpose.

As a user of the Internet I *am* running a validating DNSSEC recursor on
my hosts. Thanks to ISC for the DLV :)

I am fairly sure that a lot of other people will also want to do this.

Greets,
 Jeroen



signature.asc
Description: OpenPGP digital signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Tony Finch:

> On Thu, 16 Jul 2009, Florian Weimer wrote:
>>
>> If you want to address the issue with hotspot doorway pages, you need
>> protocol changes.
>
> Better to use an intercepting proxy in that case, and for quarantining
> infected hosts.

Doesn't work if the user uses the employer's filtering proxy for web
access.

> Protocol changes aren't sufficient because if you just extend DNS
> without adding restrictions then cunning people can obtain connectivity
> via your resolver.

This would have to be part of DHCP, I think.  DNS s too late.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Paul Wouters

On Thu, 16 Jul 2009, David Conrad wrote:


I am *VERY* happy that DNSSEC is moving along perfectly fine
which will kill any kind of changing DNS results.


DNSSEC doesn't touch anything after the validator.  It will have no effect on 
the vast majority of Comcast (or other consumer oriented) ISPs' customers.


Fedora 12 is slated to run with a validator on every machine. I would
not be surprised if OSX and Microsoft go in the same direction. And the
reason for that move is precisely because the enduser cannot distinguish
malicious DNS modifications and beneign DNS modifications. So it is
better to accept none.

We are looking at how to resolve the DNS portal issues and non-dnsssec
aware resolvers in the forwarder chain. There are some ideas that need
more attention and thoughts.

Paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Suzanne Woolf
On Wed, Jul 15, 2009 at 09:16:06PM +0200, Roy Arends wrote:
> If you want a real analogy, think alternative roots. From the users  
> perspective, that is what is happening here: an alternative namespace  
> is created. Would we have a discussion at all if this perspective was  
> used?

Yes, we would.

Well, maybe not "we" who have been contributing to this discussion on
this list. But I've observed that telling people something they want
to do is "evil" doesn't really help them decide not to do it. Telling
them what harm will be done, or telling them that there's a better way
to accomplish their business or operational objectives, is often more
productive.

I find myself in discussions of alternate roots on a regular basis.
The most effective ones neither begin nor end with anyone being
accused of anything except trying to meet legitimate objectives by the
most effective means available. I'll go further and say that most of
the time, they'd even prefer to minimize harm to others along the
way. Even when the discussion is a disguise for an extortion play
("Give us what we want or we'll take our toys and go home"), asserting
that the subject is not even to be raised merely gives it more power
as a threat.

Some people are going to read an informational RFC documenting use
cases and mechanisms for DNS redirect as endorsement by the IETF. I
submit, however, that the same people were going to do it anyway,
probably in ignorance that there was any particular downside to it or
really with any more knowledge about it than they get from their
vendors.

> I would like to see some guidance from the WG chairs here. What is the  
> next step. In lieu I propose the following: [1] Gauge consensus about  
> adopting draft-livingood-dns-redirect-00 as a WG document. [2] if this  
> draft is not adopted, we should at least get another work item on the  
> list that documents the necessity to preserve the consistency of the  
> namespace, adhering to the end to end principle, and educate folk that  
> the DNS is not the web.

All important points, and all belong in a discussion of the downsides
of DNS redirect.

> Not that we should sit still and let this one go by. I actually think  
> that the effort of writing a new draft might be lesser than the effort  
> of trying to change draft-livingood-dns-redirect. I'll wait for  
> redirect-01 and decide if its worth spending time on draft-arends-dns- 
> response-modification-considered-harmful-00.

I hope redirect-01 is more strictly descriptive and can drop defensive
terms for DNS redirect, like "enhancement" of the "user experience",
since it's by no means agreed that crippling DNSSEC (for example)
enhances the value of the Internet for anyone.

(My defense of the draft is by no means to be read as endorsing DNS
redirect. I don't, for reasons I believe are so compelling that I'm
willing to try to work with others to articulate them and let people
decide for themselves.)


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread David Conrad

On Jul 16, 2009, at 5:43 AM, Jeroen Massar wrote:

Livingood, Jason wrote:
Please do send me that list of applications.  I would very much  
like to

describe these use cases in the next version of the draft.


Please list "The Internet" as one of them, it kinda encompasses a  
lot of

others too.


Please.  Enough hyperbole.


I am *VERY* happy that DNSSEC is moving along perfectly fine
which will kill any kind of changing DNS results.


DNSSEC doesn't touch anything after the validator.  It will have no  
effect on the vast majority of Comcast (or other consumer oriented)  
ISPs' customers.


Regards,
-drc

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Tony Finch
On Thu, 16 Jul 2009, Florian Weimer wrote:
>
> If you want to address the issue with hotspot doorway pages, you need
> protocol changes.

Better to use an intercepting proxy in that case, and for quarantining
infected hosts.

Protocol changes aren't sufficient because if you just extend DNS
without adding restrictions then cunning people can obtain connectivity
via your resolver.

I think these cases are qualitatively different from the main goal of this
draft. A captive portal completely blocks normal connectivity, whereas
this draft talks about selective blocks.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Jason Livingood:

>  Actual consumer behavior doesn¹t really seem to work that
> way, but I¹m not a behavioral psychologist.  ;-) FWIW, I think most
> ISPs that introduce such services see around a 0.1% opt-out rate.

I would expect a higher rate of Dnschange/Zlob infections at a typical
U.S. ISP.  IOW, the 0.1% number doesn't seem to include users who just
use some external DNS service.

Anyway, for many users, the browser interface really doesn't change
much.  That's why it's hard for me to believe that this is done to
improve user experience.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Jeroen Massar
Livingood, Jason wrote:
>> TLDs, including your own zones.  This is indeed not just Site Finder
>> all over again - it's far worse, and breaks far more applications than
>> Site Finder did.
> 
> Please do send me that list of applications.  I would very much like to
> describe these use cases in the next version of the draft.

Please list "The Internet" as one of them, it kinda encompasses a lot of
others too. I am *VERY* happy that DNSSEC is moving along perfectly fine
which will kill any kind of changing DNS results.

Just a little example that even clued operators(*)  get it wrong:
https://lists.dns-oarc.net/pipermail/dns-operations/2009-July/004217.html

Btw it also does it for IPv4 IPs:
$ dig +short @208.67.220.220 127.0.0.1
67.215.65.132
$ dig +short @208.67.220.220 1.2.3.4
67.215.65.132

For that matter when the Internet in general gets too filtered by the
ISPs in the middle, people will start using other methods.
Crypting&signing data to avoid modification will be the first steps.
Those kind of applications, like BitTorrent which is a great example
will rise outside of any IETF and get deployed and there is nothing that
an ISP will be able to do about it unless they wall-garden the whole
thing to just allow direct talking to specific servers and nothing else,
but that won't be the Internet anymore of course

Greets,
 Jeroen

* = IMHO OpenDNS folks are doing a good job and they definitely know
about the technical problems/challenges involved in the service they are
providing, but they, like everybody else, are simply unable to catch all
problems and foresee how applications (mis)use the DNS.



signature.asc
Description: OpenPGP digital signature
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Tony Finch:

> On Thu, 16 Jul 2009, Florian Weimer wrote:
>>
>> (But I agree that a clean solution requires protocol development.)
>
> No, it just requires browser user interface improvements.

If you want to address the issue with hotspot doorway pages, you need
protocol changes.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Tony Finch
On Thu, 16 Jul 2009, Florian Weimer wrote:
>
> (But I agree that a clean solution requires protocol development.)

No, it just requires browser user interface improvements.

Tony.
-- 
f.anthony.n.finchhttp://dotat.at/
GERMAN BIGHT HUMBER: SOUTHWEST 5 TO 7. MODERATE OR ROUGH. SQUALLY SHOWERS.
MODERATE OR GOOD.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
>> FWIW, I think most ISPs that introduce such services see around a
>> 0.1% opt-out rate.
> 
> What does it prove? Most ISP that introduces lying resolvers as an
> opt-in service see a 0.1 % opt-out rate, too. It proves only that most
> users do not dare to change the settings or are not informed or have
> no time to play with settings.

With respect, I am not trying to "prove" anything.  I am merely providing
data which you and others may find interesting and which may just inform
debate a tiny bit. 

In terms of notifying users, I agree that this is important, and that
settings (opt-out and opt-in) should be both easy to use and not take much
time.  I believe we even describe this in some detail in the draft, and I am
happy to take specific feedback on those areas, as I would be delighted to
be able to use your and others feedback to improve them.

Thanks
Jason

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
> TLDs, including your own zones.  This is indeed not just Site Finder
> all over again - it's far worse, and breaks far more applications than
> Site Finder did.

Please do send me that list of applications.  I would very much like to
describe these use cases in the next version of the draft.

Thanks
Jason

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
>> SSAC's Report on DNS Response Modification
>> http://www.icann.org/en/committees/security/sac032.pdf
> 
> Indeed. Good document. There is no need to discuss about


> draft-livingood-dns-lie,

Is that really necessary?

> all the issues raised here in this WG were
> already in the SSAC document one year ago.

Indeed.  **However,** the SSAC document seems to me to speak to TLD
operators and registries, not ISPs.  To wit, please refer to page 16,
Preliminary Recommendations.  With the exception of recommendation #4, these
appear to me to all be related to actions by registrars and TLD operators.

And Preliminary Recommendation #4 states that "Third parties [defined in the
paper to include ISPs] should disclose that they practice NXDomain response
modification and provide opportunities for customers to opt out."

You may wish to note that I expand at length on this preliminary
recommendation from the SSAC paper in my draft.
 
Regards,
Jason

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Stephane Bortzmeyer
On Thu, Jul 16, 2009 at 08:07:50AM -0400,
 Livingood, Jason  wrote 
 a message of 76 lines which said:

> FWIW, I think most ISPs that introduce such services see around a
> 0.1% opt-out rate.

What does it prove? Most ISP that introduces lying resolvers as an
opt-in service see a 0.1 % opt-out rate, too. It proves only that most
users do not dare to change the settings or are not informed or have
no time to play with settings.


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Eric Brunner-Williams

Folks,

I'd like to see descriptions of the major isp-initiated intercepts:

o cn's provisioning of a name space that includes two entries not 
present in the iana root (ok, this may be less of a dynamic re-write 
feature),

o idns's provisioning of name spaces with "idns",
o other actors provisioning of name spaces with "other stuff" (new.net 
and its cognates),
o vendor intercepts where (apparently) non-cached data is (apparently) 
pre-replaced with monitized data (ask for google, get google, ask for 
odd, get ppc, repeat twice to get odd instead of ppc),

o ...

Descriptions. Discussion of incoherence issues. Author-of-dork-asserted 
necessity-and-value.


I also want to point out to recursive resolver opeators that there is a 
vehicle for policy development at ICANN, the ISP Constituency, which to 
date is simply been where major ISPs clutter up the landscape with their 
trademark lawyers and ignore all operational issues other than 
trademarks in the DNS. I'm always happy to learn what TimeWarner's 
trademarks portfolio manager's views are, but those happy moments have a 
home in the Intellectually Property Constituency and need not elbow all 
the operator issues out to ... the security and stability box of 
last-responders.


Eric

Livingood, Jason wrote:
I submitted this draft, which you can find at 
http://tools.ietf.org/html/draft-livingood-dns-redirect-00, before the 
–00 cutoff on Monday, and it will be discussed in the DNSOP WG meeting 
at IETF 75 (it is listed on the agenda).


If anyone is interested and has time before IETF 75, I’m happy to take 
feedback before then obviously. Please note that there is a list of 
open items at the end, which we plan to address in subsequent versions.


Regards,
Jason


___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop
  



___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason
>> > I'll speak for my parents here: a DNS resolver that reduces the chance that
>> they'll get a drive-by malware
>> > infection is something they would happily use. Having said that, a DNS
>> resolver that gives them a page of
>> > search results instead of the browser's error page when they mistype a URL
>> is something the *do not* want
>> > because it increases their confusion.
> 
> IMHO malicious bots are an extremely concerning problem, and the problem of
> bot infections is much more widespread than many people realize.  I¹m in the
> early stages of contributing to a bot-related draft at
> http://tools.ietf.org/html/draft-oreirdan-mody-bot-remediation-00 in case
> anyone is interested in providing private feedback (haven¹t really found a WG
> appropriate for the work).
> 
> Jason

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Livingood, Jason



On 7/16/09 3:22 AM, "Stephane Bortzmeyer"  wrote:
> 
>> > I did not hear them so this sort of users is obviously not in the
>> > dnsop WG :-) More seriously, noone mentioned here any survey about
>> > this. So, we can just guess and speculate.
> 
> You can probably safely assume that any large ISP, as with any large company
> that is relatively deliberate in their service offerings, might choose to
> conduct usability studies, focus groups, and other user surveys prior to
> introducing such services...
> 
>> > If there is really a demand of some users, I have no problem with a
  > opt-in service, honestly explained to the users

 Actual consumer behavior doesn¹t really seem to work that way, but
I¹m not a behavioral psychologist.  ;-)  FWIW, I think most ISPs that
introduce such services see around a 0.1% opt-out rate.

Jason
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Andrew Sullivan
[As before, my hat is off.  Especially to Roy Arends and Tony Finch.]

On Wed, Jul 15, 2009 at 07:46:17PM +0100, Tony Finch wrote:

> A better way for ISPs to address that problem […]

I am not trying to argue that the proposed solution is right; I am
just pointing out that there is in fact a problem, as is shown by
people trying to do something about it.

On Wed, Jul 15, 2009 at 09:16:06PM +0200, Roy Arends wrote:

> There is something fundamentally wrong with your statement, besides the 
> incredible pedantic remark about stamping our little feet that seems to 
> completely dismiss the overall sentiment of the WG. Dare I say consensus.

I apologise: I'm not trying to suggest anyone here is having a
tantrum.  I assuredly do not wish to cast aspersions on Stephane or
any other participant in DNSOP.  I regard it entirely as a privilege
to participate in these debates, and I have nothing but the deepest
respect for other participants.  I _am_, however, attempting to point
out that there are some people interested in this topic who will think
we are (collectively) having a tantrum.  Hence the "stamping" remark.  I
want to argue, very strongly, that we need to be aware of the audience
of which I am thinking, and be prepared to address their concerns too.
Saying the identified issues are a non-problem is a good way to be
dismissed as foolish purists who can't be taken seriously.  Some of
the use cases in the draft are not completely insane.  I may not agree
with the solution proposed, but I think one needs a better response
than, "The DNS messages are sacrosanct," because we already accept
some violations of the uniform namespace.

> If you want a real analogy, think alternative roots. From the users  
> perspective, that is what is happening here: an alternative namespace is 
> created. Would we have a discussion at all if this perspective was used?

Well, I'd discuss it, anyway.  I know that if someone came with a
document outlining the best way to do split-brain DNS -- which is
widely deployed and an alternative namespace if ever I've seen one --
and especially how _not_ to do it, I would take it to be a serious
contribution.  Similarly, I am listed as one of the authors of the
DNS64 draft, which is (let's face it) a way to configure an
interative-mode resolver so that it consistently replaces one kind of
answer with another kind (or "lies", if you like).  Yet nobody seems
to have thought so far that _that_ is an especially bad idea.

There is a legitimate issue in all this, and it is the deep
philosophical one that Suzanne called out explicitly and to which I
attempted to refer in my review of the draft.  But the issues are
subtle and not just simple things about namespace control and such
like, because we have a lot of deployed systems and because the early
standards documents don't offer anything in the way of definition of
terms like "authoritative" or even, really, "answer". 

Our ultimate response to the proposal in the draft may well be, "It is
a bad idea, and in its own terms here is why."  But I feel very
strongly that a response of, "That's not a real problem," is how we
DNS weenies get to be dismissed as "ivory tower" types who don't
understand how the world works.  We can engage this problem face on
now, or we can charter the DNS-BEHAVE working group in the future.
The draft under discussion is our chance to decide.

A

-- 
Andrew Sullivan
a...@shinkuro.com
Shinkuro, Inc.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Paul Hoffman
At 9:22 AM +0200 7/16/09, Stephane Bortzmeyer wrote:
>On Mon, Jul 13, 2009 at 12:01:51PM -0700,
> Paul Hoffman  wrote
> a message of 17 lines which said:
>
>> Some of the services defined in the draft are highly desired by some
>> Internet users.
>
>I did not hear them so this sort of users is obviously not in the
>dnsop WG :-) More seriously, noone mentioned here any survey about
>this. So, we can just guess and speculate.

I'll speak for my parents here: a DNS resolver that reduces the chance that 
they'll get a drive-by malware infection is something they would happily use. 
Having said that, a DNS resolver that gives them a page of search results 
instead of the browser's error page when they mistype a URL is something the 
*do not* want because it increases their confusion.

--Paul Hoffman, Director
--VPN Consortium
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Andreas Gustafsson
Stephane Bortzmeyer wrote:
> I regret one thing with SSAC 032: they mix wildcards in the zone and
> lying resolvers. True, they have similarities but also differences
> (for instance, wildcards in a zone follow the DNS protocol, and
> therefore are compatible with DNSSEC) and I'm a bit tired of Slashdot
> discussions starting with "Comcast == Sitefinder".

Another difference compared to Site Finder is that while Site Finder
only added wildcards to the zones of certain top-level domains, "web
error redirection" as described in the draft effectively behaves as if
a wildcard had been added to every single zone in the DNS, not just
every TLD but also the root zone and every zone delegated from the
TLDs, including your own zones.  This is indeed not just Site Finder
all over again - it's far worse, and breaks far more applications than
Site Finder did.
-- 
Andreas Gustafsson, g...@araneus.fi
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Paul Wouters

On Thu, 16 Jul 2009, Mark Andrews wrote:


The problem is not resolving portal.isp.com. The problem is that
mail.xelerance.com "resolves" to portal.isp.com, but never makes
it because my validating stub resolver has a DNSSEC key loaded
for xelerance.com. A problem that in the future will become worse
when the majority of the domains (and the root) is signed.

Paul


Well if xelerance.com is signed then internal (split dns)
representations also need to be signed.


I am not talking about internal. I am talking about a single DNSSEC
signed zone that becomes unreachable because I'm behind a hotspot.

this has nothing to do with split DNS and signing internal/eternal zones.

Paul
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Paul Hoffman:

> Paul: that's over the top. Some of the services defined in the draft
> are highly desired by some Internet users.

Which ones?

Currently, when a user enters "mcrsoft" in the address bar, many
browsers will automatically send her to the Microsoft homepage.  With
spoofed answers, he reaches some intermediate page instead, which may
or may not be helpful.
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Florian Weimer
* Alan Barrett:

> I think that this sort of lying recursive resolver is a bad idea.
> Instead, I suggest a new "SUGGESTION" RR type that could be returned
> in the additional section of an error message.  For example, if
> you ask for www.example.invalid, you could get back an NXDOMAIN
> error, with "SUGGESTION URL=http://10.2.3.4/www.example.invalid";
> in the additional section, and if you ask for censored.example.
> you could get back a SERVFAIL response with "SUGGESTION
> URL=http://10.2.3.4/why-we-censor.html"; in the additional section.

This would be protocol development, so it's out of the scope of this
WG.  There's also the problem that some folks want to do DNS rewriting
*now*.  If client-side changes are required, they fear that they will
out of business before they are implemented.

(But I agree that a clean solution requires protocol development.)
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Stephane Bortzmeyer
On Mon, Jul 13, 2009 at 12:01:51PM -0700,
 Paul Hoffman  wrote 
 a message of 17 lines which said:

> Some of the services defined in the draft are highly desired by some
> Internet users.

I did not hear them so this sort of users is obviously not in the
dnsop WG :-) More seriously, noone mentioned here any survey about
this. So, we can just guess and speculate.

If there is really a demand of some users, I have no problem with a
opt-in service, honestly explained to the users ("We will modify
legitimate DNS responses to blacklist some domains, to redirect you to
other sites, if you agree, click here").
___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop


Re: [DNSOP] Review of draft-livingood-dns-redirect-00

2009-07-16 Thread Stephane Bortzmeyer
On Mon, Jul 13, 2009 at 01:59:46PM +0200,
 Roy Arends  wrote 
 a message of 33 lines which said:

> SSAC's Report on DNS Response Modification
> http://www.icann.org/en/committees/security/sac032.pdf

Indeed. Good document. There is no need to discuss about
draft-livingood-dns-lie, all the issues raised here in this WG were
already in the SSAC document one year ago.

I regret one thing with SSAC 032: they mix wildcards in the zone and
lying resolvers. True, they have similarities but also differences
(for instance, wildcards in a zone follow the DNS protocol, and
therefore are compatible with DNSSEC) and I'm a bit tired of Slashdot
discussions starting with "Comcast == Sitefinder".

> IAB Commentary Architectural Concerns on the use of DNS Wildcards
> http://www.iab.org/documents/docs/2003-09-20-dns-wildcards.html

Irrelevant since it talks only about wildcards in the zone.

___
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop