On Aug 24, 2018, at 7:45 AM, Philip Homburg <pch-dnso...@u-1.phicoh.com> wrote: > >>> Well, if the OS resolver is validating, it will SERVFAIL with such a >>> query. >> >> The protocol requires special handling of those specific queries, >> so a resolver that understands the protocol will give the desired >> answer. A resolver that doesn't understand the answer will give >> NXDOMAIN even if it is validating because that RRtype is not in >> the root zone. > > It seems to go wrong when you have one validating resolver that forwards to a > resolver that supports this mechanism.
Agree. This might mean that using an unsigned 6761 special use domain name would be better. > It don't really see the point of what you propose. For resolvers obtained by > DHCP it makes more sense to include the URL in the DHCP reply than to have > yet another DNSSEC-violating discovery hack. Two reasons here (although they might not be convincing): - This proposal works for browsers even if the OS doesn't understand a new DHCP extension for DoH server URI templates - It relives the DHCP server admin from needing to know which DoH servers are associated with a particular Do53 server. As I hope I made clear in the proposal, it will work even if there is a new DHCP extension for the OS. It just doesn't rely on it. > For manually configured resolvers, it is likely more convenient for the user > to just enter the URL and let the system figure out the addresses of the > resolvers. Again, it is not clear how that information would get to the browsers. They have a hard enough time getting good answers to "what is the address being used for the resolver". > Figuring out what SNI to use using insecure DNS sort of negates any advantage > TLS authentication offers. I don't understand this at all. The SNI is the host in the URI template. --Paul Hoffman _______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop