Am 24.08.2015 um 20:19 schrieb n...@eml.cc:
On Mon, Aug 24, 2015, at 11:10 AM, Darcy Kevin (FCA) wrote:
Forwarders are selected based on an RTT(round-trip-time)-based algorithm  ....

There's an invalid presumption there -- that 'fastest' == 'most desired / 
highest priority'.  Regardless of any specific case, the requested feature 
allows the user to say, simply, what goes where an when -- rather than having 
to deal with auto-assumptions.

Have you considered the option of not forwarding *at*all*?

No. And ...

talking directly to the authoritative nameservers should allay the privacy 
concerns associated with talking through a third party....

Not entirely accurate IIUC.

The goal is to NOT allow any DNS traffic to traverse over my ISP connection in 
unencrypted form -- unless it's the absolutely lowest priority (as I defined 
it) fallback case.

For example in my current case,

class (1) traffic is over my VPN 'past' my ISP to my hosted resolver, then out 
directly to the authoritative NSs

class (2) traffic is forwarded to/through a dnscrypt-proxy on my bind-instance 
machine out to dnscrypt'd servers

class (3) traffic is the fallback case.

and you gain what?

one of your forwarding resolvers needs to do recursion an dguess what it's unencrypted - and even if you prefer 1) for whatever reasons (instead change to a ISP you trust) why not just make that VPN connection relieable and fault tolerant instead abuse named?

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to