Or, you have malware trying to bypass DNS checks.

Craig Finseth 

> On Aug 19, 2018, at 11:43, Doug Barton <do...@dougbarton.us> wrote:
> 
>> On 08/18/2018 06:08 PM, Ted Lemon wrote:
>> The thing is that most devices don't connect to just one network.   So while 
>> your devices on your network can certainly trust port 853 on your network, 
>> when they roam to other networks, they have no reason to trust it.   If you 
>> have devices that never roam to other networks, that's fine, but we have to 
>> design for the more general case.   There's no way with DHCP for the device 
>> to tell that it's connected to a particular network, other than matching IP 
>> addresses, which isn't a great idea.
> 
> Ted,
> 
> I'd like to turn your question back to you. What threat model are you 
> protecting the user from by not allowing a DHCP option to use a DOH or DOT 
> server?
> 
> It seems to me that in the overwhelming majority of cases (near 100%) the 
> user is going to get their local resolver from the DHCP server, whether they 
> are on a trusted network (like work or home), or roaming at Eve's Coffee Shop.
> 
> So either you have a sophisticated user who has preconfigured their own 
> resolver and ignores the DHCP setting, or you have the typical user who 
> doesn't understand how any of this stuff works, and therefore has implicit 
> "trust" regarding the local network and the settings from the DHCP server.
> 
> Given that (and feel free to tell me if I've missed something), what harm can 
> come to the user if the resolver that they are already trusting can also be 
> accessed over DOH or DOT?
> 
> Doug
> 
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to