:: Re: [DNG] web conferencing software…
Pàgina inicial
Delete this message
Reply to this message
Autor: Rick Moen
Data:  
A: dng
Assumptes nous: Re: [DNG] Opennic
Assumpte: Re: [DNG] web conferencing software (was Re: Any interest in a Devuan Meetup in Colorado Springs or Denver?)
Quoting Gabe Stanton via Dng (dng@???):

> In the absence of a "community of dns server operators and users", is
> the optimal option to have everyone run their own recursive server? But
> then the upstream servers still get the birds-eye view and will very
> likely abuse that information like the big companies do now.


Please pardon my being blunt, but I don't think you have a realistic
understanding of how typical patterns of authoritative nameservice data
and caching work. I rather suspect you haven't stopped to think about
that.

Let's say I run a local recursive DNS nameserver on my local LAN for use
by my and all other local hosts. For the sake of discussion, let us
assume that it has what is misleadingly called an 'ICANN' root hints
file.

At service startup time, the instance starts getting and caching TLD,
SLD, etc. authoritative data and caching it for the duration of TTLs.
Right, now, kindly tell me where on the planet is the network node that
provides a "birds-eye view" of query traffic processed by my recursive
server? The root nameservers? Nope, not hardly. All they have is the
hits where my nameserver followed the RD-bit-marked queries to find
various TLD nameservers. TLD zones' nameservers? Nope, not hardly.
They have only analogous logfile data when my nameserver first located
and then cached information about SLD nameservers.

In fact, the very fact that I am operating a recursive nameserver means
that I have greatly impoverished every possible spying vantage point.
The best of the bad choices in places to spy on my network's port-53
activity is thus right on the far side of my network uplink, at my local
bandwidth provider. And, even there, because of pervasive caching, even
my uplink has extremely poor data about what the machines on my local
LAN are looking up.

Ideally, one has a contractual relationship with a reputable good
provider who looks after customer interests in accordance to local
business practices and law, such as (to cite the USA local legal
concept) the implied covenant of good faith and fair dealing. However,
that contract concept is (naturally) not a shield for privacy but rather
a cudgel to wield in civil litigation, so the best thing to do is to
limit what your immediate uplink can learn about your network traffic.
Various crypto schemes help limit that data, but -- my point -- so does
operating a local recursive nameserver, rather than outsourcing to
-anyone- on the other side of the uplink.