On 8/7/2015 6:03 AM, Warren Kumari wrote:
> Hi all,
>
> The chairs believe that there is sufficient interest in the working
> group for early allocation of a port for dns over TLS, following RFC
> 7120.
Hi, Warren,
It might be useful to summarize on this list the rationale for this
allocation and the plan for its use.
In particular:
- why port 53 is not sufficient using STARTTLS
- why a system port, rather than a user port, is appropriate
- whether TLS-protected DNS would ever be expected on port 53
Speaking as an individual (though I also chair the IANA port expert
review team, which reviews applications not through the standards
process), my view is that:
a) it would have been preferable to use the existing
assigned port for DNS (e.g., using STARTTLS), as I note
in RFC7605
b) the existing ubiquity of DNS ALGs will make (a) difficult
(this does not apply to new protocols but would here)
c) if the secure variant has a separate port, then it would
be confusing to run the same service on multiple ports
d) if this service is assigned a new port, it should be
a system port; although system ports do not often afford
the protections once assumed, it seems reasonable to stay
with the same type of port as the original service
As a result, I concur with the assignment of a port for "dns-s" (FWIW,
that's what I would suggest, as it is the convention for most new secure
variants) as a system port.
Joe
_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy