How will you block it?

On Sat, Aug 18, 2018 at 5:46 PM, Paul Vixie <p...@redbarn.org> wrote:

>
>
> Ted Lemon wrote:
>
>> DHCP authentication doesn't exist.   We already rejected a draft that
>> described how to set up DoH with DHCP.   Yours is a little more
>> complicated, but doesn't seem any less dangerous.   Before you go any
>> farther on this, you might ask yourself a couple of questions:
>>
>> 1. Why is DoH being used?
>> 2. What is the thread model that DoH is addressing?
>> 3 How does adding this configuration mechanism impact DoH's ability to
>> address that threat model?
>>
>
> the DoH use case is for web users and web apps who do not trust their
> network operator and who are not trusted by their network operator, so it's
> a policies-in-the-night model where data can be imported from The Web
> without approval or permission or control or observability by a network
> operator. it is in other words a thin DNS-only way to do what Tor does.
>
> as a network operator, i oppose this thinking. i predict a long war in
> which web users and apps who want to use DoH to reach an external DNS
> resolver will be treated as attackers, and either banned or blocked. in
> some parts of the world such use will be illegal and even punishable, much
> as Tor is today.
>
> this is what happened after edward snowden flew to hong kong: the pendulum
> swung so far the other way that many of us saw only absurdity.
>
> the possibility that large CDN operators will colo a DOH endpoint with
> their high-value hosting, in order to discourage network operators from
> blocking it, raises the stakes. _i_ will block it. most corporate networks
> will block it in some form. some countries will block it. no DNS content
> will enter my network without having passed through my RPZ rules. if a CDN
> operator wants to play "chicken", i guess that we will.
>
> --
> P Vixie
>
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to