On Fri, 20 Mar 2015, Watson Ladd wrote:

What's wrong with DNScrypt?

It's just a preconfigured new VPN protocol where the clients need to
know the public key of this new VPN protocol provider to setup a VPN
limited to "DNS"Curve packets.

- It is incompatible with IETF VPN protocols (IPsec/IKE, TLS)
- It is incompatible with actual DNS packets
- It does not support (from what I can deduce) DNSSEC
- It requires chaining to an actual DNS resolver
- It has no crypto agility (from what I can deduce)

The Wijngaards drafts also defines a new VPN protocol, but for a very
good reason - it is attempting to use the DNS protocol as transport,
while remaining completely compatible with DNS (eg does not throw
cruft over port 53 that is not DNS) Whether that is a good idea,
I am still undecided on but to me it is a justification for why not
using TLS or IKE/IPsec

If the starting point is "preconfigured public key", I see no reason why
not to use IPsec or TLS as the transport to encrypt regular DNS traffic.

In other words, dnscrypt does not add anything to our toolbox that we
don't already have, so there is no reason to add it.

Paul

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to