> -----Original Message----- > From: dns-privacy [mailto:dns-privacy-boun...@ietf.org] On Behalf Of Nicholas > Weaver > Sent: Thursday, April 24, 2014 1:58 AM > To: Paul Wouters > Cc: dnsop; Nicholas Weaver; dns-priv...@ietf.org > Subject: Re: [dns-privacy] [DNSOP] DNS over DTLS (DNSoD) > > > On Apr 23, 2014, at 1:00 PM, Paul Wouters <p...@nohats.ca> wrote: > > No, I fully disagree with this. Port 53 TCP has a much better chance > > at working these days than a random other newly assigned port.
On the contrary, Firewalls are configured today to permit UDP port 53 and block TCP port 53. Why should firewalls change their configuration ? DNSoD does not require any changes to the Firewall configuration. Browsers already support DTLS because of WebRTC (SRTP-DTLS for media streams, SCTP over DTLS over UDP for data channels). Cheers, -Tiru > > Not true. Port 53 is far more molested than "random": INBOUND firewall rules > prevent you from running new services without firewall rule modifications, but > outbound blocking is far less common. (Our test port for this is TCP 1947 > with > Netalyzr). > > > -- > Nicholas Weaver it is a tale, told by an idiot, > nwea...@icsi.berkeley.edu full of sound and fury, > 510-666-2903 .signifying nothing > PGP: http://www1.icsi.berkeley.edu/~nweaver/data/nweaver_pub.asc _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop