Eliot Lear <lear@xxxxxxx> wrote: > Is this same service going to further harm clients by making it even more > difficult to block known malicious web sites? Not only would a local > deployment not be able to do this, but proxies themselves wouldn't be able to > spot malware. Combine that with some rather impressive phishing capabilities > of bad actors, and aren't we just hamstringing our ability to put down > malware attacks? Without taking a position on the fundamental questions you ask, my understanding is that the proxy would be run by an entity that had a lot of properties, and that wished to provide pseudonymous access to them. Candidates that I can think of would include: google, godaddy, azure, ec2, cloudflare, *.gov, *.gc.ca, wordpress hosting companies, ... and that the target properties would be configured with some trust in the proxy system. > If what we are doing is > standardizing tooling and providing libraries for BOTnets to operate against > web sites, where the web site has no recourse when it is attacked, then why > would anyone implement this? Given the relationship that I assuming above, then the web sites would be able to communicate back to the proxy, and would be able to kill traffic there. BUT: A concern that I have is that in the already very assymetrical relationship between big property owners and small ones, this protocol makes it even more uneven. So I would urge us to get a clear idea of what the possible costs of this protocol are. What are the benefits? Like your blog and facebook questions about Tor, I'm not convinced that the privacy benefits of this are large. I didn't think oblivious-DNS was particularly useful either, because it was basically just turning stub resolvers into mutated full resolvers, without actually teaching them to do DNSSEC. If they could do DNSSEC, then we could trust answers from any place, and then we could do some kind of p2p DNS queries to get better anonymization (and probably, more resiliency for DNS).
-- Michael Richardson <mcr+IETF@xxxxxxxxxxxx> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
Attachment:
signature.asc
Description: PGP signature