> -----Original Message-----
> From: Ralf Weber [mailto:d...@fl1ger.de]
> Sent: Thursday, April 24, 2014 7:22 PM
> To: Tirumaleswar Reddy (tireddy)
> Cc: Nicholas Weaver; Paul Wouters; dnsop; dns-priv...@ietf.org
> Subject: Re: [dns-privacy] [DNSOP] DNS over DTLS (DNSoD)
> 
> Moin!
> 
> 
> On 24.04.2014, at 15:28, "Tirumaleswar Reddy (tireddy)" <tire...@cisco.com>
> wrote:
> 
> >> -----Original Message-----
> >> From: dns-privacy [mailto:dns-privacy-boun...@ietf.org] On Behalf Of
> >> Nicholas Weaver
> >> Sent: Thursday, April 24, 2014 1:58 AM
> >> To: Paul Wouters
> >> Cc: dnsop; Nicholas Weaver; dns-priv...@ietf.org
> >> Subject: Re: [dns-privacy] [DNSOP] DNS over DTLS (DNSoD)
> >>
> >>
> >>> On Apr 23, 2014, at 1:00 PM, Paul Wouters <p...@nohats.ca> wrote:
> >>> No, I fully disagree with this. Port 53 TCP has a much better chance
> >>> at working these days than a random other newly assigned port.
> >
> > On the contrary, Firewalls are configured today to permit UDP port 53 and
> block TCP port 53. Why should firewalls change their configuration ?
> I know lots of firewalls that also allow TCP/53, 

Any specific reason for the firewalls to permit TCP/53 other than for zone 
transfer ?

> but the real problem with all
> these middle boxes that make changing DNS hard is that they believe to
> understand the full protocol and only pass what they think is right. So 
> everything
> new we come up will be dropped (Been there, done that). We have to be very
> careful with changes to the DNS protocol if we want them to be deployed

Agreed, It totally depends on the environment in which the firewall is 
deployed, it's capability and configuration. 

For example
[1] For firewalls  deployed in Enterprise network and the I.T realizing the 
importance of privacy then FW could be configured to permit DNSoD over 53. 
Similarly I don't see any problem with the firewall deployed in the Home 
network.
[2] It could be a problem with firewalls deployed in airports, coffee shops,  
where I.T may not care about privacy, and the  firewall configured could block 
non-DNS traffic on port 53. In such environments if a user wants privacy then 
it's probably better to go with DNS servers that the user trusts. For example 
DNSCrypt uses UDP/443 by default and if the connectivity with the DNS servers 
fails then it resorts to TCP/443 and it works on UDP/53 too. I guess With 
{D}TLS we will need a similar approach where client tries connectivity using 
multiple ports, L4 protocols etc.

Firewalls today are already capable of inspecting the TLS handshake and can 
also act as {D}TLS proxy.  DTLS is already deployed and used today to secure 
WebRTC media, data channels and CoAP protocol in IOT environments. Firewalls 
are catching up with these emerging protocols to make sure it works with them.

Cheers,
-Tiru

> 
> So long
> Ralf
> 
> Sent from my iPhone

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to