Paul, it's really not helpful to do this kind of reductio ad absurdum.

You are assuming that all networks operators have a security policy which
they have a right to enforce on the end user.   In some cases this is
true.   In most cases it is false.   E.g., the network to which I am
currently connected has no such right of enforcement.   It would be
*catastrophic* if it did, because I'm the paying customer, and supposedly
this is a country in which freedom of speech is guaranteed.   I am entirely
within my rights to use DoH whether the network operator likes it or not.
 It is not illegal for me to do so, and if I did so, it would not be so
that I could violate the law—it would be so that I could protect my privacy
and avoid DNS spoofing that returns forged answers, which I consider to be
a security threat, and which I am fairly certain my network operator does.

It is certainly true that in some cases, someone using DoH would be
violating a network operator policy that is enforceable, or would be
violating the law.   But that is by no means the most common case, and it
does you no credit to pretend otherwise.

On Mon, Aug 20, 2018 at 11:49 AM, Paul Vixie <p...@redbarn.org> wrote:

>
>
> Joe Abley wrote:
> ....
>
>>
>> These are the same use-case, just viewed with different bias.
>>
>>
> so, DoH's use cases all involve either violating the law, or violating the
> network operator's security policy? egads, i hope not. the ietf can't be
> seen backing something that has _no_ legitimate purpose.
>
> --
> P Vixie
>
>
> _______________________________________________
> DNSOP mailing list
> DNSOP@ietf.org
> https://www.ietf.org/mailman/listinfo/dnsop
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to