> -----Original Message-----
> From: Int-area [mailto:int-area-boun...@ietf.org] On Behalf Of Matthäus
> Wander
> Sent: Sunday, July 06, 2014 5:56 PM
> To: Paul Vixie
> Cc: dnsop@ietf.org; int-a...@ietf.org
> Subject: Re: [Int-area] [DNSOP] various approaches to dns channel secrecy
> 
> * Paul Vixie [7/5/2014 7:47 PM]:
> > Matthäus Wander wrote:
> >> DTLS works on top of UDP (among others) and thus can pass CPE devices.
> >
> > no, it cannot. DTLS does not look something that the CPE was
> > programmed to accept; thus in many cases it is silently dropped.
> >
> 
> DTLS can be used on top of UDP. CPE devices allow outgoing UDP sessions to
> arbitrary ports. If they didn't, many online games and VoIP applications would
> not work.
> 
> Here's an example DTLS session passing my DSL router at home:
> > https://www.cloudshark.org/captures/7d2ae4cfe155
> 
> Source code found here:
> > http://marc.info/?l=openssl-users&m=113009464321966&w=3

WebRTC enabled browsers already use DTLS to secure media.

-Tiru

> 
> Regards,
> Matt

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to