On 08/20/2018 06:11 PM, Paul Hoffman wrote:
DHCP options are easy and cheap. However #2 was vexing. The proposal that an OS say "oh look, there is a DoH server, I'll use that because it is more secure than Do53" was what was controversial because of the utter lack of DHCP security. Some of the folks on the mic line disagreed with the assumption that, given two pieces of insecurely-acquired information (a Do53 address and a DoH template) that the latter would result with a more secure connection. A network admin can see the port 53 traffic and see if there's crap in there; they can't see the inner DoH traffic.

Paul,

You, like Ted, are looking at the problem the wrong way 'round. The USER is no worse with a DOH/DOT DHCP option than they are with the existing resolver option. 99.<many more 9s>% of users don't even know what DHCP is, they just want to connect their iDevice to the coffee shop WiFi.

Unless you can show how the user is harmed by the option, it's silly to oppose it.

Now, the network operator may very well be harmed by not being able to see the user's DNS traffic, if they are not the ones operating the resolver; because their opportunities to monetize NXDOMAIN, sell user data, etc. may be reduced, or go away entirely. If they ARE operating the resolver, they can still see all the DNS traffic they want to. And operators in the former case won't use the option anyway.

So again, what is the harm, to real world users, for having DHCP options to configure DOH or DOT?

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to