> On Aug 20, 2018, at 9:11 PM, Paul Hoffman <paul.hoff...@vpnc.org> wrote: > > On 20 Aug 2018, at 17:47, Tom Pusateri wrote: > >>> On Aug 20, 2018, at 12:42 PM, Tony Finch <d...@dotat.at> wrote: >>> >>> Marek Vavruša <mvavrusa=40cloudflare....@dmarc.ietf.org> wrote: >>>> >>>> https://github.com/vavrusa/draft-dhcp-dprive/blob/master/draft-dhcp-dprive..txt >>> >>> This is interesting to me because I want to support DoTH on my campus >>> resolvers. >>> >>> Regarding DoH, the DHCP option ought to include a URI template (there >>> isn't a .well-known for DoH). I plan to set up my servers so that >>> misdirected attempts to get web pages from the DoH server are redirected >>> to the relevant documentation; that's much easier if the DoH endpoint >>> isn't at the server root. >> >> Our variant of this same idea that Willem Toorop and I presented at the DRIU >> BOF in Montréal has a URI for the DoH case: >> >> https://tools.ietf.org/html/draft-pusateri-dhc-dns-driu-00 >> <https://tools.ietf.org/html/draft-pusateri-dhc-dns-driu-00><https://tools..ietf.org/html/draft-pusateri-dhc-dns-driu-00 >> <https://tools.ietf.org/html/draft-pusateri-dhc-dns-driu-00>> >> >> But let me remind everyone that there was a lot of people agreeing with Ted >> in Montréal and so far, Ted appears to be standing all by himself. >> >> Where are all the other folks that shot down this idea earlier? :) > > Judging what was said at an excited mic line is always challenging. :-) Two > issues are being conflated here: > 1) a DHCP option to include a URI template > 2) how the DHCP client in an OS would use that option > > DHCP options are easy and cheap. However #2 was vexing. The proposal that an > OS say "oh look, there is a DoH server, I'll use that because it is more > secure than Do53" was what was controversial because of the utter lack of > DHCP security. Some of the folks on the mic line disagreed with the > assumption that, given two pieces of insecurely-acquired information (a Do53 > address and a DoH template) that the latter would result with a more secure > connection. A network admin can see the port 53 traffic and see if there's > crap in there; they can't see the inner DoH traffic. > > --Paul Hoffman
Yes, this was one good point. Another point I remember most clearly is that DHCP has fallen out of favor for communicating all but the most minimal network bootstrap configuration information. There was general agreement in the room that you only should use DHCP in IPv4 for address/router info and then use trusted sources for everything else. In IPv6, SLAAC generally provides this. One more point (from the Android crowd) was that they are going to try to connect to the DNS server’s IP address using port 853 using DoT at the same time they are trying to resolve names over port 53 with UDP. If they’re able to make a DoT connection, they’ll use it. This doesn’t provide for a way to have an ADN to verify the certificate but a PTR query can give you a name to do certificate validation and/or DANE validation. So they seemed to be making the point that no DHCP extensions were necessary. Tom
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop