I think we've gone way off track here.   DoH exists, and you can't undo
that.   Maybe it was a mistake, maybe it wasn't, but that ship has sailed.
 I think you're implicitly arguing that the IETF should have done a better
job of modeling the threats before advancing the protocol, and if we had
done, perhaps we wouldn't have advanced it.   So why are you now arguing
that the IETF shouldn't do a similarly good job of modeling the threats
around configuring DoH using DHCP?

On Mon, Aug 20, 2018 at 10:51 PM, Paul Vixie <p...@redbarn.org> wrote:

>
>
> Marek Vavruša wrote:
>
>> ...
>>
>> I'm still not sure that IETF should define the provider of trust, as
>> the trust is relative. But you're right Ted, it should definitely be
>> at written down andformalized if we want to move forward.
>>
>> I have to compose my thoughts on this first. I'll try next weekend if I
>> get
>> some of that bravery or willpower back.
>>
>
> if you write down trust assumptions you'll be enumerating disjoint sets of
> same as actually practiced by different users and different operators whose
> reasons should be treated as valid rather than challenged.
>
> mine is, i monitor and control the network path between my dhcp client and
> my dhcp server very much more carefully than i can monitor and control the
> network path to RDNS servers. therefore i am comfortable having the former
> introduce me to the latter. other perspectives differ.
>
> --
> P Vixie
>
>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to