No, I think maybe I haven't been communicating as well as I should.   What
I have been saying is that we need to decide what our threat model is, so
that we can figure out what to recommend.   What you are saying is "we
should recommend this."   What you are proposing to recommend has a
perfectly valid threat model associated with it.   I'm just saying write
that up, don't just leave it unstated.   Let's get clarity on it and decide
that we're okay with it, or not, before we write a standard based on it.
 I don't think this needs to be a heavy-weight process—I'm just objecting
to the handwaving.   And to be clear, the model that Paul has been
advocating actually is not what you just said—it's a different, also valid,
threat model.   The problem with Paul's model is that it assumes a user who
is able to reason clearly about threat models; I don't think we can do
that, and I would object to a spec that was based on that threat model.   I
think we need to do that work, and not leave it to the user.   We've all
seen what happens when you demand that users be security experts.

On Sun, Aug 19, 2018 at 8:28 PM, Doug Barton <do...@dougbarton.us> wrote:

> On 08/19/2018 04:57 PM, manu tman wrote:
>
>>
>>
>> On Sun, Aug 19, 2018 at 4:46 PM Ted Lemon <mel...@fugue.com <mailto:
>> mel...@fugue.com>> wrote:
>>
>>     A user who relies on the dhcp server for dns server info is no worse
>>     off. The problem is that if your host lets the dhcp server override
>>     the DoT or DoH configuration you entered manually, you are a lot
>>     worse off.
>>
>>
>> This seems to be a static vs dynamic setup. Either you use dynamic and
>> you will happily accept what you get from DHCP and possibly upgrade to
>> (HTTP|TL)S or you have set your resolvers statically and you are already
>> ignoring the nameservers provided by the DHCP server.
>> If you do not accept the servers provided by DHCP, there is no reason you
>> would accept extra attributes for those same snameservers.
>> Manu
>>
>
> Yes, those are my thoughts precisely.
>
> I don't see a risk model where a user configures DOH or DOT servers
> explicitly, but does not disable DHCP configuration for DNS. Am I missing
> something?
>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to