I agree.   We should write down the advice that we think users and
implementors of DoH need.  :)

On Mon, Aug 20, 2018 at 10:31 PM, Tom Pusateri <pusat...@bangj.com> wrote:

> Sure. My point was that there could be legitimate uses of DoH.
>
> You have to move DNSSEC validation from the resolver to the client in
> order to really validate the answers if you can’t trust the resolver.
>
> Tom
>
>
> On Aug 20, 2018, at 10:28 PM, Ted Lemon <mel...@fugue.com> wrote:
>
> Of course, the question is, how does the consumer of that data decide what
> is okay and what's not?   We can't just say that the server has to behave
> correctly: someone has to enforce it.
>
> On Mon, Aug 20, 2018 at 10:25 PM, Tom Pusateri <pusat...@bangj.com> wrote:
>
>>
>>
>> > On Aug 20, 2018, at 10:21 PM, Paul Vixie <p...@redbarn.org> wrote:
>> >
>> >
>> >
>> > Tom Pusateri wrote:
>> >> ... I don’t know if it’s generally accepted that DoH will replace
>> >> UDP/53 or DoT in the stub resolver or DoH will just end up in the
>> >> browsers as a way to speed up web pages. But if DoH stays in the
>> >> browser and DoT is tried and used on all DNS servers, there’s not a
>> >> problem to solve.
>> >
>> > if DOH is widely used by criminals, botnets, and malware to bypass
>> perimeter security policy, then there will be a big problem and we will be
>> solving it for many years to come, even if the browser is the only thing
>> using it. browsers are where most modern vulns have occurred, and i expect
>> that trend to accelerate. "because that's where the money was.”
>>
>> I can see good use cases and bad ones.
>>
>> If web servers did DNSSEC validation and only served addresses for names
>> that were validated, I wouldn’t have a problem with that at all.
>>
>> If web servers only served addresses for names within the domain of the
>> web server, I wouldn’t have a problem with that either.
>>
>> if they start serving non DNSSEC validated addresses for names outside
>> their domain, I think they’re overreaching.
>>
>> Tom
>>
>>
>> _______________________________________________
>> DNSOP mailing list
>> DNSOP@ietf.org
>> https://www.ietf.org/mailman/listinfo/dnsop
>>
>
>
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to