On 08/18/2018 06:08 PM, Ted Lemon wrote:
The thing is that most devices don't connect to just one network. So
while your devices on your network can certainly trust port 853 on your
network, when they roam to other networks, they have no reason to trust
it. If you have devices that never roam to other networks, that's
fine, but we have to design for the more general case. There's no way
with DHCP for the device to tell that it's connected to a particular
network, other than matching IP addresses, which isn't a great idea.
Ted,
I'd like to turn your question back to you. What threat model are you
protecting the user from by not allowing a DHCP option to use a DOH or
DOT server?
It seems to me that in the overwhelming majority of cases (near 100%)
the user is going to get their local resolver from the DHCP server,
whether they are on a trusted network (like work or home), or roaming at
Eve's Coffee Shop.
So either you have a sophisticated user who has preconfigured their own
resolver and ignores the DHCP setting, or you have the typical user who
doesn't understand how any of this stuff works, and therefore has
implicit "trust" regarding the local network and the settings from the
DHCP server.
Given that (and feel free to tell me if I've missed something), what
harm can come to the user if the resolver that they are already trusting
can also be accessed over DOH or DOT?
Doug
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop