On 8/19/18, 1:02 PM, "DNSOP on behalf of Doug Barton" <dnsop-boun...@ietf.org 
on behalf of do...@dougbarton.us> wrote:
    
> Personally I see securing the path from the stub to the resolver as a 
    good step in the ultimate goal of encrypting all of the things. :) 

[JL] No disagreement here. I think the issue may be more to do with choice over 
the resolver (how it gets assigned). To date on the Internet that's all been 
down to local policy or user choice to override those policies, but now it 
seems like the alternative proposal may look like a centralized / top-down 
policy model. That's probably more the friction point than the encryption 
itself. 

> So the question isn't, "Why encrypt?" the question is, why on earth 
    wouldn't you want to?
   
[JL] Again, I agree. I think it boils down quite simply to how the resolver is 
assigned, and whether user choice or local policy can override that assignment, 
and perhaps as well what data is passed from recursive to authority (e.g. 
EDNS-CS).
 
> So it's unlikely that an ISP would deploy DOH or DOT 
    in the first place, 

[JL] I would not make that assumption; it could well be ISPs would be natural 
early adopters given the chance to do so.

> so the idea of a DHCP option to support it isn't 
    necessarily relevant in that environment. That doesn't mean it's not 
    relevant elsewhere.

[JL] It seems silly not to allow for a way for DHCP assignment of DOH/DOT 
servers. Surely it must be the case this is possible? If the network wants to 
assign them, then so be it IMO. The user can always ignore and override that 
optionally - as they do today with various public recursive resolvers. 






 

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to