On Jul 9, 2009, at 5:23 PM, Livingood, Jason wrote:
I submitted this draft, which you can find at http://tools.ietf.org/html/draft-livingood-dns-redirect-00
, before the –00 cutoff on Monday, and it will be discussed in the
DNSOP WG meeting at IETF 75 (it is listed on the agenda).
If anyone is interested and has time before IETF 75, I’m happy to
take feedback before then obviously. Please note that there is a
list of open items at the end, which we plan to address in
subsequent versions.
This part of section 10 is troublesome:
So the only case where DNS security extensions cause problems for
DNS Redirect is with a validating stub resolver. This case doesn't
have widespread deployment now and could be mitigated by using trust
anchor, configured by the applicable ISP or DNS ASP, that could be
used to sign the redirected answers.
This mitigation strategy just doesn't work, and for a very good
reason, as it allows a downgrade attack.
As for the rest of the document, I think it overloads the term
"redirection" by incorporating lawfully mandated filtering (whatever
that means), and therefor wrongly justifying this practice altogether.
In general, this kind of muddling with the DNS protocol assumes that
the sole purpose of the DNS is to allow a web-browser find the address
of a web-server. Clearly it is not.
There are alternatives. I run unbound from my laptop. Windows users
can do too: http://unbound.net/downloads/unbound_setup_1.3.1.exe
Other alternatives are OARC's ODVR: https://www.dns-oarc.net/oarc/services/odvr
Kind regards,
Roy Arends
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop