<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">Paul,<br class=""><div><br class=""></div><div>On Mar 29, 2019, at 1:43 AM, Paul Vixie <<a href="mailto:paul@redbarn.org" class="">paul@redbarn.org</a>> wrote:<br class=""><blockquote type="cite" class=""><div class=""><span style="caret-color: rgb(0, 0, 0); font-family: Menlo-Regular; font-size: 10px; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none; float: none; display: inline !important;" class="">fwiw, your analogy hit home with me. as a network operator for both my family and my company, i resent being lumped in with </span><span style="caret-color: rgb(0, 0, 0); font-family: Menlo-Regular;" class="">oppressive regimes when members of the web community are trying to decide what DNS control plane bypasses to offer. </span></div></blockquote><div><br class=""></div><div>Wait. The person who co-created MAPS and co-authored RPZ that allows for the blocking of entire TLDs is unhappy because he’s being lumped in with groups he has no relationship with?</div><div><br class=""></div><div><blockquote type="cite" class=""><span style="caret-color: rgb(0, 0, 0); font-family: Menlo-Regular;" class="">i find the ietf's post-snowden consensus on enshrining rights for all end users including bots, malware, intruders, poisoned supply chains, and unruly teenagers at home, at the expense of every right (and responsibility!) of network operators to be naive knee jerkism, unhelpful, and disrespectful.</span></blockquote></div><div><br class=""></div><div>Another point of view is that in the end-to-end model, the post-Snowden approach the IETF has decided to pursue is returning the rights to the end users stolen by network operators and pervasive surviellers.</div><div><br class=""></div><div>DOH is an unsurprising outcome of an understanding that the underlying network shouldn’t be trusted. You are, as is your right as a network operator, asserting that if I connect to your network, I must trust your network. As such, I should be willing to install your cert to allow for DPI on HTTPS connections. If you feel the cost of doing this is too high, perhaps you should charge me for connecting to your network?</div><div><br class=""></div><div>And to be clear, this isn’t a situation I’m happy with. It is, however, a natural outcome of lying DNS servers, monetization of passive DNS collection, pervasive surveillance, etc. </div><div><br class=""></div><div>Regards,</div><div>-drc</div><div><br class=""></div></div><style class="">ul[class*='mb-extra__public-links'], ul[class*='mb-note__public-links'], ul[class*='mb-task__public-links'] { display: none !important; }</style></body></html>