On Monday, 27 January 2025 13:26:06 CET Robert Wagner wrote: > FYI - EO 14144 has the following provision related to encrypting DNS: > > (c) Encrypting Domain Name System (DNS) traffic in transit is a critical > step to protecting both the confidentiality of the information being > transmitted to, and the integrity of the communication with, the DNS > resolver. (i) Within 90 days of the date of this order, the Secretary of > Homeland Security, acting through the Director of CISA, shall publish > template contract language requiring that any product that acts as a DNS > resolver (whether client or server) for the Federal Government support > encrypted DNS and shall recommend that language to the FAR Council. Within > 120 days of receiving the recommended language, the FAR Council shall > review it, and, as appropriate and consistent with applicable law, the > agency members of the FAR Council shall jointly take steps to amend the > FAR. (ii) Within 180 days of the date of this order, FCEB agencies shall > enable encrypted DNS protocols wherever their existing clients and servers > support those protocols. FCEB agencies shall also enable such protocols > within 180 days of any additional clients and servers supporting such > protocols. .... > > 2025-01470.pdf<https://public-inspection.federalregister.gov/2025-01470.pdf> > Federal Register on 01/17/2025 and available online at Nationality Act of > 1952 (8 U.S.C. 1182(f)), and section 301 of > https://federalregister.gov/d/2025-01470 EXECUTIVE ORDER U.S.C. 1601 et > seq. 14144<https://public-inspection.federalregister.gov/2025-01470.pdf> 6 > develop and publish a preliminary update to the SSDF. This update shall > include practices, procedures, controls, and implementation examples > regarding the public-inspection.federalregister.gov > If codified in FAR - then I believe all contractors will be required to > encrypt DNS as well. > > Should be interesting... > > RW
I've been skimming over this document, to try to figure out what it is that they want, and from whom. I'm by no means a legal expert and even DNS is something I'd hesitate to claim expertise beyond basic understanding in, but this seems to be aimed mostly at the US government itself? If the US President wants to enforce that from the US government branches, that is not something I'm entitled to comment on. I am not even American. But if I'm not mistaken, does that mean that this does not affect people/organizations outside the US, and possibly not even non-government providers within the US? If so, it may be a nuance worthy of note. Granted, even that doesn't mean that there wouldn't be any spill-over. Identifying those may be able to prove useful. For example, it wouldn't surprise me to learn that some of these government organizations are also using BIND? At the end of the day, it does enjoy the privilege of being the de facto standard/reference implementation. N.B.: I find it amusing how the People's Republic of China has several explicit mentions embedded within this document. It's something I tend to see from EU governmental bodies (particularly the Council) too, but they tend to separate that into their press releases. It's interesting to be able to peek behind the curtains at how each of these world-leading governments approaches this PR matter. -- Met vriendelijke groet, Michael De Roover Mail: i...@nixmagic.com Web: michael.de.roover.eu.org -- Visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information. bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users